Targeting businesses can be much more profitable for fraudsters than personal identity theft.

Size: px
Start display at page:

Download "Targeting businesses can be much more profitable for fraudsters than personal identity theft."

Transcription

1 When You Aren t You: Corporate Identity Theft A New Snake in the Grass... (and Check Fraud Still #1.) CorporateIdentity Theft CorporateIdentity Theft is one of the newest financial threats facing businesses and organizations. Presented at 2015 Greg Litster, President SAFEChecks There are two major types of Corporate Identity Theft. In one major type, fraudsters target and imitate a legitimate business. Targeting businesses can be much more profitable for fraudsters than personal identity theft. Dun & Bradstreet has reported cases of corporate identity theft in at least 22 states, and predicts this crime will spread across the country. Corporateidentity theft is the unauthorized use of a company s name and information by criminals in order to illegally obtain money, goods, or services. The Internet has made it easy to create a non-existent business that looks legitimate no organization is immune from the threat of corporate identity theft. Some losses have reached a half-million dollars before the crime was discovered. 1 1

2 When banks or other commercial lenders evaluate a business, they look for evidencethat the company is what its officers say it is, and that it has the legal and financial capacity to conduct its business. Evidence = Proof of Right Proof of Right can include financial statements business addresses telephone numbers government licenses credit history etc. Each Proof of Right that can be verified increases the appearance of a company s legitimacy. Thieves can create fraudulent Proofs of Right by gaining access to state government records of legitimate businesses, and then altering company information, such as the registered agents names and addresses. Criminals open new bank accounts and obtain loans and credit cards in the name of the business, often using the compromised identity of business owners or officers. They use falsified financial statements to even lease offices, furniture and equipment, creating the illusion of a successful business. They use bank loans and retailer lines of credit to purchases items that can readily be sold for cash. Often, this leaves the unwitting victimized business awash in debt and legal fees defending itself against creditors. 2 2

3 Criminals tend to target smaller and midsize businesses with strong credit ratings that are easily identified through credit rating agencies. Business credit reports are intended to promote buying and selling, and help managers make risk assessment decisions, so business credit reports are readily available to virtually anyone. Family businesses, churches, and inactive companies have been targeted. Smaller businesses with strong credit ratings are tempting targets for criminals because they often have fewer legal and financial defenses than large corporations. Real Life Examples. In California: A seafood company received an order for $500,000 worth of goods. After completing a credit check, the company shipped the order and billed the customer. The customer responded that it had never placed nor received the order. It was discovered that the customer's credit information and a different address had been given by a fraudster. In California, identity thieves moved into the same building as a law firm under the firm's own name! and billed the firm for $70,000 worth of computers and furniture. When the products arrived, they hired a moving truck and disappeared. By that time, both the goods and the thief had already vanished. 3 3

4 In Oregon, identity thieves reinstated old mining companies to steal their corporate identity. (Oregon recently established limits on how long a company can be dormant before it is reinstated.) In Colorado: Criminals updated or altered the registration information on file with the state. After the registration information was changed, the criminals used the altered corporate identity to make online applications for credit from various retailers, including Home Depot, Office Depot, Apple and Dell. Colorado authorities became aware of the scam after one of the targeted companies was contacted by a major retailer regarding nearly $250,000 in purchases made in its name. In Colorado: A small business owner learned of his company s identity theft when he contacted Dun & Bradstreet to ensure an address change was recorded properly. That's when he learned of a new registered agent and address -an Aurora mail drop that was set up to forward everything to California. The thieves also had changed key information about his company on Dun & Bradstreet's database, such as increasing the number of his employees from 15 to 150 and his company's annual revenues by a factor of 10! In Florida: An aviation company had been dissolved by the owners. It was then reinstated by corporate identity thieves. Soon after, they applied for a $140,000 federal fuel tax credit, which was delivered as a check. The scammers and the money disappeared and the previous owners only learned about it when the IRS came knocking on their door." Solutions to this type of Corporate Identity Theft. Many state governments are actively working to help better protect government controlled and regulated business data. 4 4

5 The biggest challenge is alerting and educating organizations about this new type of crime, and motivating them actively self-monitor. Defensive strategies include using better passwords, dual-authentication controls, and checking business legal filings regularly. Organizations should protect their business EIN / TIN as they would a Social Security number. Businesses should verifyatypical large purchases and change of shipping address from current clients. Businesses should verifyunusual large purchases from new clients. Keep all documents containing business information or business identifiers in a secure place that is not accessible by unauthorized persons. Shred them when discarded. Use caution when completing a credit application. Criminals post fake credit applications, and after a legitimate company has filled it out, the criminals have all the information they need to defraud the business, or obtain loans or lines of credit in the business' name. Review your commercial and business banking agreements understand the time frames for reporting fraud, anomalies, etc. Monitor your business accounts daily. Many banks provide and text alerts regarding your account activity, which can help alert you to suspicious transactions. 5 5

6 If your business provides or maintains a list of trade or credit references, request each reference to notify you if they are contacted by a third party. If you are not applying or planning to apply for new credit, you can place a security freeze on your personal credit to prevent businesses with whom you do not already have an existing relationship from accessing your credit file. Training!! Protecting your business, and the sensitive information of your business, your customers, and employees is the responsibility of everyone in your organization. In the second major category of Corporate Identity Theft, criminals target an organization s clients or vendors through Corporate Hacking. Hackers target Accounts Receivable List Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers New Bank R/T and account controlled by hackers Solutions to this type of Corporate Identity Theft. 6 6

7 Banks: Monitor bank changes on outgoing repetitive wires Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Use payee positive pay and high security checks RESOURCES: businessidtheft.org Dun & Bradstreet Bloomberg BusinessWeek, The Council of State Governments Also, review information and resources offered by your state and local government. Check Fraud Why talk about Check Fraud? Check Fraud Produces more $ Losses than all other types of payment fraud! AFP 2015 Payments Fraud Survey 50%of organizations still issue checks. Check fraud is not going away! AFP 2015 Payments Fraud Survey Checks remain the most-often targeted payment method by those committing fraud attacks. Check fraud also accounts for the largest dollar amount of financial loss due to fraud. 7 7

8 Fraudulent Payments by Method (Respondents were hit multiple ways; total > 100%) Fraud Losses by Method How Dollars were actually lost CHECKS 77% Corporate Cards 34% Wire Tranfers 27% CHECKS 45% Corporate Credit Cards 25% Wire Transfers 20% ACH Debits 7% 40 ACH Debits 25% 40 Corporate 20 ACH Credits 10% 20 Debit Cards 2% The newest twists on Check Fraud. ACH Credits 1% 0 Percentage 0 Percentage Mobile Banking and Deposit Fraud: Double Debits Mobile Banking Deposit Fraud Scenario: A check is mailed to Dishonest Don Don deposits the check using smart phone app Digitized check is paid at drawer s bank 10 days later, Don cashes the same check at a check cashing store 2 nd check hits the drawer s bank account (check is presented for payment twice) Who Takes The Loss? The answer is found in the Rules governing Check 21 Under the Warranty Liability for the loss falls to the bankthat allowed its customer to use its smart phone app. Bank can charge the loss against its customer (assuming $$ is still there) Mobile Banking and Deposit Fraud: Holder in Due Course Scenario: A title insurance company gives John Doe a check at closing. John Doe deposits the check via a mobile app, then comes back to office and returns the check, asking that it be made payable to John Doe orjane Doe. 8 8

9 The company doesn t think to place a Stop Payment on the first check because they have the check in hand. 1. If a physical check is returned for a replacement, place a stop paymenton the returned check. It may have been deposited remotely. 2. Recipient MUST sign an affidavitstating the check was not deposited. 3. An Affidavit does not provide protection, only a right to sue and collect legal fees. Strategies to Prevent Check Fraud Don t Write Checks! Use Commercial Purchase Cards Pay electronically (ACH) But, if you are going to write checks #1. Positive Pay Positive Pay......a powerful tool! PositivePay.net #2. High Security Checks Effective check fraud prevention strategies begin with a high security check. 9 9

10 High Security Checks 1. Deter the forger(psychological warfare) 2.Thwart forgers attempts to replicateor alter the check 3.Provide legal protection from some Holder in Due Course claims (UCC 3-302) What makes a check secure? 10+ safety features Important Security Features Controlled Check Stock Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines Controlled Check Stock Is a critical security feature Checks should beunique in some wayto every other organization s check stock No two organizations should have the exact, identical check stock Uncontrolled Check Stock Checks ARE NOTuniquely designed or customized for every end-user It is sold entirely blankto countless entities, organizations, and fraudsters, by print brokers all over the USA How is Uncontrolled Check Stock a problem? Counterfeit Cashiers Checks Counterfeit Cashiers Checks Counterfeit Cashiers Checks 10 10

11 Counterfeit Cashiers Checks Counterfeit Cashiers Checks Holder in Due Course and Uncontrolled Check Stock Web: FraudTips.net HIDC & Uncontrolled Check Stock Robert Triffinv. Somerset Valley Bank and Hauser Contracting Company Obtaining Controlled Check Stock 1. Custom-manufacturechecks using an ORIGINAL design, true-watermarked paper, and at least 10 security features, OR 2. Buy from a supplierthat only sells controlled check stock that has never been replicated or used in a check fraud scam. SAFEChecks.com Other Important Security Features Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines HIDC & High Security Checks Robert Triffin v. Pomerantz Staffing Services AFP 2014 Payments Fraud Survey Check Fraud Methods Alterations: 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% This is up from 49% and 22% respectively, in the 2013 Survey. AFP 2014 Payments Fraud Survey Most of these alterations could have been prevented with check security features! 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% 11 11

12 Preventing Altered Payees High-security checks 14 point font for Payee Name High-quality toner Hot laser printer Payee Positive Pay Frank Abagnale s Fraud Bulletin on Laser Check Printing Positive Pay Provides NO PROTECTION Against Added Payee Names! #3. Secure Check Writing Software To Prevent Added Payees Typical Check Layout Fix it:use a Secure Name Font Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Leaves No Room for Adding Bogus Payee Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Open Areas Where Forgers Add A New Payee Name Secure Name Font No room for an Added Payee Identical data is printed on both checks. Which check would forgers prefer to attack? Greg Litster, President SAFEChecks (800) 949-BANK (818) cell greg@safechecks.com GLITSTER@aol.com # # # # 12 12

Mobile Banking Fraud the newest twist on check fraud.

Mobile Banking Fraud the newest twist on check fraud. mrdc Fraud Any Recourse Against Losses?? Mobile Banking and Deposit Fraud April 20, 2017 Greg Litster, President SAFEChecks Mobile Banking Fraud the newest twist on check fraud. Mobile remote check deposit

More information

HOLDER IN DUE COURSE and CHECK FRAUD: Summary and Detailed Explanation

HOLDER IN DUE COURSE and CHECK FRAUD: Summary and Detailed Explanation HOLDER IN DUE COURSE and CHECK FRAUD: Summary and Detailed Explanation Holder in Due Course Summary Holder in Due Course (HIDC) is part of the Uniform Commercial Code (UCC) that significantly impacts an

More information

Check 21, Remote Deposit Capture and Check Fraud A Summary

Check 21, Remote Deposit Capture and Check Fraud A Summary Check 21, Remote Deposit Capture and Check Fraud A Summary Check 21 s Final Rule includes an Indemnity provision that seriously affects an organization s liability for check fraud, under certain conditions.

More information

The Future Treasury Officer

The Future Treasury Officer The Future Treasury Officer Presenters: QR Code William Underwood Kathryn Hewitt Greg Litster Date: Introduction o William Underwood II, Director of Financial and IT Services/ACM, Oakland Park, FL wunderwood@oaklandparkfl.gov

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

FINANCIAL CRIMES INVESTIGATIONS

FINANCIAL CRIMES INVESTIGATIONS FINANCIAL CRIMES INVESTIGATIONS today s presenters... Brian Sallee Cuyahoga County Sheriff s Department Major Crimes Task Force Larry Henderhan FDA Special Agent Major Crimes Task Force Counterfeit Investigations

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Protecting against check fraud perspectives and best practices

Protecting against check fraud perspectives and best practices Protecting against check fraud perspectives and best practices Presenter Name Corp Title, Functional Title Date of presentation 2016 Wells Fargo Bank, N.A. All rights reserved. For public use. Agenda Check

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

mitigating Payments Fraud risk:

mitigating Payments Fraud risk: HigHer education banking mitigating Payments Fraud risk: Strategies and best Practices for Higher education institutions 2 Mitigating Payments Fraud Risk: Strategies and Best Practices for Higher Education

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Date Here. Welcome University of Michigan International Students

Date Here. Welcome University of Michigan International Students Date Here Welcome University of Michigan International Students U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection against

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

Electronic Commerce and Cyber Risk

Electronic Commerce and Cyber Risk Electronic Commerce and Cyber Risk Fifth Third Bank All Rights Reserved Reality and Solutions Objectives for Today What I will cover How banks are changing How the public is changing How the laws are changing

More information

2017 AFP. Payments Fraud and Control Survey. Underwritten by REPORT OF SURVEY RESULTS

2017 AFP. Payments Fraud and Control Survey. Underwritten by REPORT OF SURVEY RESULTS 2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS Underwritten by 2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS March 2017 Underwritten by Association for Financial

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud

KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud Inside: Fraud: A Problem That Won t Go Away How Criminals Exploit Vulnerabilities In Treasury Practices Fraud Prevention From An

More information

2017 annual fraud update:

2017 annual fraud update: 2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Legal Liabilities When Check Fraud Occurs

Legal Liabilities When Check Fraud Occurs Legal Liabilities When Check Fraud Occurs by Terri D. Thomas, JD (tthomas@ksbankers.com) Presented on February 17, 2016 1 Definitions Page 3 Drawee the financial institution on which a check is drawn.

More information

Legal Liabilities When Check Fraud Occurs

Legal Liabilities When Check Fraud Occurs Legal Liabilities When Check Fraud Occurs by Terri D. Thomas, JD (tthomas@ksbankers.com) Presented on September 24, 2015 1 Definitions Page 3 Drawee the financial institution on which a check is drawn.

More information

my Identity Learning objectives

my Identity Learning objectives my Identity TM 2 my Identity Learning objectives In this overview, you will learn about: The four components of my Identity TM How the product can benefit customers in real-world scenarios The benefits

More information

FRAUD: MEMBER ACTION PACKET

FRAUD: MEMBER ACTION PACKET FRAUD: MEMBER ACTION PACKET INDEX BASICS OF IDENTITY THEFT...1 SECURE YOUR ONLINE IDENTITY/PASSWORDS...1 ID THEFT...1 ATM/DEBIT/CREDIT... 1-2 COUTERFEIT AND FAKE CHECKS...2 KEEPING AN EYE ON YOUR CREDIT

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

Frequently Asked Questions

Frequently Asked Questions Account to Account Transfers... 1 Bill Pay... 1 Branch Locations and Hours... 2 Credit Card Business... 2 Credit Card Personal... 3 Cybersecurity Information... 3 Debit Cards... 4 estatements/enotices...

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

CASHMERE VALLEY BANK ELECTRONIC BANKING AGREEMENT AND DISCLOSURE STATEMENT

CASHMERE VALLEY BANK ELECTRONIC BANKING AGREEMENT AND DISCLOSURE STATEMENT CASHMERE VALLEY BANK ELECTRONIC BANKING AGREEMENT AND DISCLOSURE STATEMENT In this Electronic Banking Agreement and Disclosure, Agreement, "you", "your", and "yours" refers to each person that will be

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Hacking Healthcare: Attacks on the Highest Value Asset

Hacking Healthcare: Attacks on the Highest Value Asset Hacking Healthcare: Attacks on the Highest Value Asset Paul Dant Chief Strategy Officer Independent Security Evaluators The Key Takeaway Who am I? Paul Dant Chief Strategist @ ISE 9: First digital product

More information

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer

More information

CoreLogic Credco First American Way Poway, CA (800)

CoreLogic Credco First American Way Poway, CA (800) Red Flag Regulation WHAT IT IS The Red Flag Regulation implements Sections 114 and 315 of the FACT Act. It finalizes three distinct requirements two of which are relevant to automotive, RV and marine dealers,

More information

2. COVERAGE REQUESTED DESIRED COVERAGE: (PLEASE CHECK THE COVERAGE REQUESTED) LIMITS REQUESTED Employee Theft Forgery or Alteration Theft Inside Premi

2. COVERAGE REQUESTED DESIRED COVERAGE: (PLEASE CHECK THE COVERAGE REQUESTED) LIMITS REQUESTED Employee Theft Forgery or Alteration Theft Inside Premi PLEASE ENSURE THAT THE FOLLOWING ARE PROVIDED WITH THE APPLICATION: Latest audited annual report Auditor s letter to Management, if available 1. GENERAL INFORMATION 1. Name of Organization or Legal Entity

More information

University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions

University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions Description: University of Illinois Community Credit Union Consumer Remote Deposit Anywhere Terms & Conditions The remote deposit capture services ("Mobile Deposit" or "Services") are designed to allow

More information

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies

More information

card fraud business Helpful information for Merchants Avoiding card fraud

card fraud business Helpful information for Merchants Avoiding card fraud card fraud business Helpful information for Merchants Avoiding card fraud How to stop card fraud before it happens. It is an unfortunate fact that not everyone with a card, or card number, is the card

More information

FARMERS INSURANCE FEDERAL CREDIT UNION

FARMERS INSURANCE FEDERAL CREDIT UNION FARMERS INSURANCE FEDERAL CREDIT UNION ELECTRONIC SERVICES DISCLOSURE AND AGREEMENT In this Disclosure and Agreement, the words I, me, mine, my, us, and our mean each and all of those (whether one or more

More information

Evaluating Your Company s Data Protection & Recovery Plan

Evaluating Your Company s Data Protection & Recovery Plan Evaluating Your Company s Data Protection & Recovery Plan CBIA Cybersecurity Webinar Series 11AM 12PM Part V. Presented by: Stewart Tosh Charles Bellingrath Date: December 7, 2017 Today s presenters Stewart

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Identity theft and identity fraud are terms used to refer to all types

More information

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

A Losing Bet: Binary Options

A Losing Bet: Binary Options A Losing Bet: Binary Options What are Binary Options? Binary options the latest investment scam that s costing victims everything. - CBC, March 2017 Binary Options are a sort of wager where investors bet

More information

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One Preventing Senior Scams Welcome MoneyWi$e is a joint financial education project of Consumer Action and Capital One Overview of topics Recognizing scams Protecting yourself from fraud Steps to take if

More information

BY SUBSCRIBING TO THE SERVICE OR USING THE SERVICE, YOU AGREE TO THE TERMS OF THIS AGREEMENT

BY SUBSCRIBING TO THE SERVICE OR USING THE SERVICE, YOU AGREE TO THE TERMS OF THIS AGREEMENT Bank of the Ozarks Online Banking Agreement This Online Banking Agreement (the Agreement ) governs your use of the Online Banking Service ( the Service ) with Bank of the Ozarks available at www.bankozarks.com

More information

Identity Fraud Endorsement

Identity Fraud Endorsement 220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity

More information

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy

More information

Banking Basics 101. How to Manage Your Finances and Still Have Money Left Over For a Night Out. Course objectives learn about:

Banking Basics 101. How to Manage Your Finances and Still Have Money Left Over For a Night Out. Course objectives learn about: Banking Basics 101 Course objectives learn about: Using a checking account Various types of payment vehicles Benefits of a savings account How to Manage Your Finances and Still Have Money Left Over For

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information

Business Member Service Agreement Part 2

Business Member Service Agreement Part 2 Business Member Service Agreement Part 2 P.O. Box 1010 Moline, IL 61266-1010 (309) 793-6200 www.ihmvcu.org Contents AGREEMENT TERMS AND DISCLOSURES 1 1. This is an Agreement between You and Your Credit

More information

A Losing Bet: Binary Options

A Losing Bet: Binary Options A Losing Bet: Binary Options What are Binary Options? Binary Options are a sort of wager where investors bet on the performance of an underlying asset, often a currency, stock index, or share, usually

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW

A Review of Actual Fraud Cases in 2017 FRAUD REVIEW A Review of Actual Fraud Cases in 2017 FRAUD REVIEW Contents Introduction 3 Fraud Snapshot 4 Case Studies Credit Card Fraud 5 Business Email Compromise Fraud 6 Payroll Fraud 7 Supplier Fraud 8 Outlook

More information

ELECTRONIC FUND TRANSFERS DISCLOSURE. and MOBILE BANKING AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES IMPORTANT! IF YOU DISCOVER YOUR

ELECTRONIC FUND TRANSFERS DISCLOSURE. and MOBILE BANKING AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES IMPORTANT! IF YOU DISCOVER YOUR ELECTRONIC FUND TRANSFERS DISCLOSURE and MOBILE BANKING AGREEMENT YOUR RIGHTS AND RESPONSIBILITIES IMPORTANT! IF YOU DISCOVER YOUR VISA DEBIT CARD OR MAC CARD IS LOST OR STOLEN, PLEASE REPORT IT IMMEDIATELY

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Revised April 2010 Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the El Paso County Sheriff s Office and obtained a police report number

More information

What is Identity Theft?

What is Identity Theft? IDENTITY THEFT What is Identity Theft? Identity theft is a growing problem in today s information age. Criminals are becoming more sophisticated in their ability to use your personal information for their

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted Reno Police Department, complete a crime report and obtained a police report case number

More information

Just the facts about proving your identity.

Just the facts about proving your identity. July 2007 Our guides here to help you This guide is part of our Everyday money series. About the Financial Services Authority. Buying a home. Saving Pensions and andpensions andif things investing. retirement.

More information

Good From The Inside Out. Saturday, April 8, 2017

Good From The Inside Out. Saturday, April 8, 2017 Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU

More information

Better Business Bureau

Better Business Bureau Better Business Bureau 1 Who We Are & Our Vision BBB is an unbiased non-profit organization that sets and upholds high standards for fair and honest business behavior. For more than 100 years, Better Business

More information

NAU Police Department s Identity Theft Victim s Packet

NAU Police Department s Identity Theft Victim s Packet NAU Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted the NAU Police Department and obtained a police report number

More information

ID Theft Protection Kit

ID Theft Protection Kit ID Theft Protection Kit Congratulations. You ve taken a big step in protecting the power of your credit and your identity. Identity theft is a serious crime. Victims can spend a significant amount of time

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Securing Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance

Securing Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance Securing Your Balance Sheet Fidelity/Crime Insurance Presenter: Mary da Costa, Manager, Corporate Insurance DISCLAIMER The following presentation is for general information. In all cases the terms of the

More information

Equifax Data Breach: Your Vital Next Steps

Equifax Data Breach: Your Vital Next Steps Equifax Data Breach: Your Vital Next Steps David A. Reed Partner, Ann Davidson Vice President Risk Consulting/ Bond Division Allied Solutions, LLC Do You Remember When this Was the Biggest Threat to Data

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

To find out more about our accessible services please visit

To find out more about our accessible services please visit Give me the facts Welcome This guide explains how your account works. It takes you through the ways you may be able to access your account, make payments and keep both your finances and information safe.

More information

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more

More information

Dealing with Duplicates 3-Part Session Series -Session 1- Legal Aspects, Warranties & Recourse

Dealing with Duplicates 3-Part Session Series -Session 1- Legal Aspects, Warranties & Recourse Dealing with Duplicates 3-Part Session Series -Session 1- Legal Aspects, Warranties & Recourse Phyllis Meyerson, AAP, CCM, Executive Vice President, ECCHO Ellen Heffner, NCP, Director, Product Management,

More information

Additional Information on the Dirty Dozen

Additional Information on the Dirty Dozen Additional Information on the Dirty Dozen 1. Identity Theft Topping this year s list Dirty Dozen list is identity theft. In response to growing identity theft concerns, the IRS has embarked on a comprehensive

More information

Business Days For purposes of these disclosures, our business days are Monday through Friday, excluding holidays.

Business Days For purposes of these disclosures, our business days are Monday through Friday, excluding holidays. P.O. Box 330 Angwin, CA 94508 707.965.2483 707.965.0142 Fax www.silveradocu.com Silverado Online Home Banking, Bill Pay and Mobile Banking Electronic Funds Transfer Disclosure and Agreement This Silverado

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

Best Practices for Handling Retrievals and Chargebacks. Lodging

Best Practices for Handling Retrievals and Chargebacks. Lodging Best Practices for Handling Retrievals and Chargebacks Lodging January 30, 2018 Table of Contents Authorization Processing... 3 Transaction Processing... 3 Proper Disclosure... 4 Deterring Fraud... 4 VISA

More information

MEDICAL IDENTITY THEFT Presented by:

MEDICAL IDENTITY THEFT Presented by: MEDICAL IDENTITY THEFT Presented by: Tami Flemmer, Risk Management Director Melissa Hauer, Corporate Counsel Ernie Thurman, Security Coordinator October 8, 2014 Medical Identity Theft OVERVIEW OF PRESENTATION

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

2017 Cyber Security and Data Privacy Study

2017 Cyber Security and Data Privacy Study RESEARCH REPORT DECEMBER 2017 2017 Cyber Security and Data Privacy Study How does your company compare? TABLE OF CONTENTS 05 How does your company compare? 06 Key findings 08 Cyber security and data privacy

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information