KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud

Size: px
Start display at page:

Download "KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud"

Transcription

1 KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud Inside: Fraud: A Problem That Won t Go Away How Criminals Exploit Vulnerabilities In Treasury Practices Fraud Prevention From An Enterprise Perspective Vigilance: Your First Line Of Defense Fraud Is Real You Are Not Alone We Can Help

2 executive summary: Fraud rings are better organized and more technologically sophisticated than ever before. Enterprise USA 2008 Enterprise USA 2008 Fraud: A Problem That Won t Go Away At this very moment, businesses like yours are being targeted by criminals whose sole intent is to obtain funds by illegal means. Operating both individually and in well-organized rings, these corrupt and calculating individuals have learned to identify and exploit weaknesses that victims often overlook. Hidden in plain sight among employees, associates and the population at large the perpetrators of payment fraud rob American enterprise of billions of dollars each year. In fact, the Association of Certified Fraud Examiners (ACFE) calculates annual losses due to fraud at $652 billion,* or approximately 5 percent of the nation s Gross Domestic Product. Are you vulnerable? In a recent survey conducted by the Association for Financial Professionals (AFP), 72 percent of all participating organizations reported that they had been the victims of attempted or actual payment fraud.** And, unfortunately, fraud appears to be a growth industry. In a roundtable discussion held by the Federal Reserve Bank, participants reported that costs associated with this steadily growing problem are not only substantial, but increasing as the incidence of fraud continues to escalate. The hidden costs. The cost of fraud is not limited to direct losses. Also significant are the many expenses associated with investigative efforts and attempts to recover lost funds. Less quantifiable, but potentially even more damaging, is the negative impact of

3 ACH Fraud: The profile of a victim. The AFP finds that organizations with annual revenues under $1 billion are nearly three times more likely to sustain financial losses due to ACH fraud than are businesses with revenues over the $1 billion mark. In examining the statistics, the reason for this significant disparity becomes readily apparent: larger institutions are much more likely to implement fraud prevention solutions. successful fraud attacks on the public image of victim organizations. If victimized by fraud, you can expect to spend over 175 hours filling out insurance claims, police reports and affidavits, and in completing numerous other timeconsuming tasks in an attempt to repair the damage. Added to the time and expense of correcting fraudulent activity, the cost of each incident typically exceeds $3,000. Alliance: Joining forces on multiple fronts. Clearly, to prevail in the battle against fraud, organizations must take a proactive stance. Today, businesses and institutions are actively engaging in building alliances with financial institutions that can provide the expertise to pinpoint vulnerabilities and structure solutions that can help to defend the organization against fraud and from the losses it can cause. How Criminals Exploit Vulnerabilities In Treasury Practices Fraud is as old as commerce itself but as the technology of treasury management has evolved, so too have the methods used to perpetrate it. Today, the level of sophistication among those who conspire to commit fraud is alarmingly high. Disaffected and cunning, techsavvy criminals arm themselves with an insider s understanding of treasury management practices and set forth to defraud the organizations that drive our economy. The costs are immense. Fortunately, banking services designed to protect organizations against fraud also continue to evolve as well. The following are several of the many ways criminals endeavor to exploit vulnerabilities in treasury practices. The most frequent targets. Despite the declining use of checks, check fraud continues to increase and is still the most prevalent form of payment fraud by a significant margin. In fact, 41 percent of all organizations responding to the AFP study reported an increase in the incidence of check fraud.** Other frequent targets of payment fraud are: Automated Clearing House (ACH) Credit and debit cards Wire transfers Technology: The criminal s toolbox. At first glance, check fraud may seem relatively low-tech. But forged signatures and altered payable amounts are just the beginning. Current methodologies are as advanced as today s technology. One of the fastestgrowing types of check fraud involves the production of counterfeit checks. Using tools that are readily available including desktop publishing software, color copiers and high-end printers counterfeiters produce replications of genuine checks that are both convincing and effective in producing the intended result. Criminals also commit check fraud by: Stealing employee paychecks, reimbursement checks and rebate checks. Continued on next page.

4 Understanding your exposure. It is often assumed that financial institutions are responsible for losses resulting from fraud. However, an organization may be held responsible in some instances for example, if it failed to reconcile accounts and/or identify and return fraudulent items in a timely manner. Financial responsibility is determined on a caseby-case basis, depending on the facts of the case and applicable law. Responsibility may be linked to the entity determined to have been in a position to take preventive action, but which did not do so. You should seek the advice of your legal counsel regarding responsibility for fraud. Taking advantage of checkconversion loopholes at unprotected financial institutions. Criminals obtain account and routing numbers from checks and use this information to initiate payments typically via phone or the Internet that are presented electronically as ACH transactions. Fraud in the electronic realm. As Automated Clearing House transactions and other electronic payment methods have gained increasing acceptance, so too has the incidence of electronic fraud. Rapidly assimilating these new and emergent electronic payment technologies, the criminally opportunistic relentlessly continue to pursue their victims in the electronic realm. With the proliferation of phishing schemes and online trojan attacks, organizations must acknowledge the necessity of protecting access to account information. Today, expertly crafted phishing s, which are used to fraudulently obtain passwords and other account information, are one of the most damaging weapons in the criminal toolbox. Trojans, which harvest account data automatically and all too often without being detected are also responsible for significant financial losses. The potential for loss due to trojans is expected to continue to increase over time, as these malicious programs become more sophisticated. Respondents to the AFP survey report that over a third of the fraud attempts made against their organizations involved ACH transactions.** And among organizations that were found to be financially responsible for losses due to fraud, more than half did not use ACH debit blocks or filters. Another 22 percent of ACH fraud attempts were successful because the organization had not reconciled its accounts or returned payments on a timely basis. And 17 percent of victim organizations reported that the source of fraud could be traced to persons within their own organizations. Beware the inside job. How do you identify a criminal who has penetrated your defenses? The answer may not be so obvious. According to data collected by the ACFE, less than 8 percent of prosecutable suspects had been convicted of any crime prior to committing internal fraud. The costs of internal fraud can be staggering. The ACFE finds that the median loss due to internal fraud is $159,000 per incident.* And nearly 25 percent of all reported internal fraud cases resulted in losses of at least $1 million. Among the most frequent types of internal fraud are asset appropriation schemes involving invoicing, expense reimbursements, check tampering and payroll. Small to mid-sized businesses are particularly susceptible to internal fraud and suffer disproportionate losses as compared to larger organizations.

5 Fraud Prevention From An Enterprise Perspective Taking the offensive: A multidimensional strategy. Safeguarding the organization s cash flow and profits has long been the role of the corporate treasury department. However, as fraud continues to grow in scope and sophistication, the need to manage this threat has never been greater. To effectively combat fraud, forward-thinking organizations must adopt multidimensional strategies that function in synergy with their existing initiatives. And because fraud can be expansive across an entire organization, it is also essential to engage internal partners by communicating concerns and sharing observations. Combating fraud: The essentials. Combating fraud isn t simple, but it is possible if managed effectively. KeyBank recommends that you begin with these essential activities: Segregate duties. Designate one person to make payments and another person to reconcile, to help decrease the potential for internal fraud. Reconcile on a timely basis. The more frequently you reconcile, the sooner you ll be able to identify any unusual check or ACH transactions. Utilize electronic processes. Use online reporting to enable faster reconcilement and authorization decisions for questionable/red-flagged items. Also, consider issuing rebates and refunds as electronic transactions, and use direct deposit for payroll. Protect account information, user IDs and passwords. Account numbers, routing numbers and other relevant account details are gold to criminals who attempt to commit fraud. Instruct employees in the protection of secure information and teach them to recognize phishing s and other attempts to obtain sensitive data. Implement fraud prevention solutions. Implement bank-provided treasury management solutions that can help to mitigate fraud through early detection and safeguard against erroneous postings. Use two-factor authentication to strengthen transactionlevel security. Verify user identity with a user ID and password, plus a stronger factor such as a digital certificate. Defending against check fraud. Dealing with fraudulent checks is costly, not only in terms of the actual loss, but in terms of expenses related to remediation. The following strategies are fundamental to a successful anti-fraud initiative: Identify altered payee names and payable amounts, forged signatures and fraudulently replicated checks. Detecting unauthorized checking activity, automatically identifying questionable items and providing the option to either approve or reject these items are important safeguards Continued on next page.

6 against altered or fraudulent checks. An effective tool in managing these scenarios is positive pay. An extra layer of protection, known as payee positive pay, is provided by comparing the payee name on presented checks to an electronic list submitted by the client organization. This feature helps to ensure authenticity by automatically reporting all exceptions, and allowing the client to make the desired dispositions. Because many financial institutions do not offer this service, it is important to determine availability. Identify fraudulent activity rapidly. The more quickly fraudulent activity is identified, the more likely it is that you can prevent it. This is why it is imperative to reconcile accounts on a timely basis. By doing so, your organization can identify exceptions that may be fraudulent and take appropriate action before financial damage can result. Enterprise USA Use automated account reconcilement. This is an effective alternative to traditional reconcilement methods. It provides detailed checking account information that reduces the time needed to reconcile accounts and enables you to identify fraudulent activity sooner. Typically, organizations choose from one of two distinct levels of account reconcilement: 2008 Partial reconcilement provides a list of paid checks in numerical order. Check serial numbers, dollar amounts, dates paid and sequence numbers are displayed within this concise, easy-to-read report. Full reconcilement in addition to a list of paid checks, it provides an itemized report of outstanding checks and exception items. Keep paper checks out of the wrong hands. Paper checks, when stolen or altered, can provide a direct route into your accounts. One of the best ways to keep them out of the hands of criminals is to archive checks as digital images and store them on CD-ROM or other digital media. This process enables organizations to easily manage, retrieve and view images on demand. Typically, archived check images include the front and back of each check, providing a visual record of the signature, endorsement and/or bank of first deposit. Automated account reconcilement reports and bank statements are also frequently imaged for archival purposes. Make it more difficult to counterfeit your checks. One of the more effective ways to reduce check fraud is to utilize enhanced check stock security features, including microprinting, dualcolor gradients, watermarked security tags and photocopy prevention markings. To further complicate the efforts of counterfeiters, limit access to sensitive account information and check stock. Often, the most cost-effective way to achieve these objectives is to outsource check production.

7 Safeguarding the ACH process. Automated Clearing House (ACH) payments present new and potentially lucrative opportunities for criminals. To help protect against fraudulent ACH transactions, organizations need to carefully monitor electronic account activity. In addition to reconciling accounts daily, the primary solutions in the battle against ACH fraud are ACH blocks and filters. Designed to protect against unauthorized electronic ACH debits, these methods enable users to authorize specific ACH debits or block all ACH debits to their accounts. Users can select the level of protection that best fits their organizations: Matching all ACH debits against a pre-approved account list provided by the client to determine if the debit should be paid. Receiving a daily exception report of all unauthorized attempts to debit protected accounts, including an option to pay or not pay each item on the list or place a block on an account. Rejecting all ACH debits attempting to post to a specified account. ACH block and filter reports are often available via fax, or the Internet. Closing the loopholes between digital and traditional payment methods. To be effective, your fraud protection initiative needs to close the loopholes that can open when checks are presented as ACH payments. Positive Pay and ACH block and filter solutions should be structured to work hand-in-hand including the verification of payee name for electronic items to identify questionable transactions and to return suspicious items upon presentment. Because not all financial institutions offer this level of integration, it is important to evaluate carefully when selecting a solutions provider. Vigilance: Your First Line Of Defense Fact #1: No amount of planning and oversight will ever completely eliminate fraud. The bad guys are just that good. Fact #2: Criminals look for easy targets, so if an account is protected, it becomes a far less attractive target for would-be criminals. This is particularly true in the case of internal fraud, especially when members of the organization know that fraud prevention measures are in use. Fact #3: With a well-conceived, well-executed system in place, you have the potential to reduce fraud to a point at which it becomes a negligible nuisance, and perhaps even eradicate it for considerable periods of time all without incurring unreasonable cost. The right blend of process and technology. It s time to take a proactive stance against fraud. KeyBank can help you formulate a strategy designed to address your needs. Contact Key today to discuss your fraud strategy and to obtain recommendations specific to your organization.

8 For more information, visit key.com/globaltreasury. SM *Association of Certified Fraud Examiners (ACFE), 2006 Report to the Nation on Occupational Fraud & Abuse **Association for Financial Professionals (AFP), 2007 AFP Payments Fraud Survey: Report of Survey Results, 2007 Federal Trade Commission. Identity Theft Clearing House, 2002 The American Bankers Association. Deposit Account Fraud Survey Report, 2004 This document is designed to provide general information only and is not legal advice. If legal advice or other expert assistance is required, the services of a competent professional should be sought. KeyBank does not make any warranties regarding the results obtained from the use of this information.

mitigating Payments Fraud risk:

mitigating Payments Fraud risk: HigHer education banking mitigating Payments Fraud risk: Strategies and best Practices for Higher education institutions 2 Mitigating Payments Fraud Risk: Strategies and Best Practices for Higher Education

More information

Everything You Didn t Want To Know About Employee Crime

Everything You Didn t Want To Know About Employee Crime Everything You Didn t Want To Know About Employee Crime It's something employers don't want to have to think about: employee crime. Finding out that trusted, long-term employees have been stealing from

More information

Insuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a

More information

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION

FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...

More information

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath MMAAA Annual Meeting Conducting an Investigative Audit June 13, 2017 Presented by: John J. Sullivan, CFE Melanson Heath Association of Certified Fraud Examiners 2016 Global Fraud Study Figure 1. Statistics

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

AGA Risk and Fraud Webinar

AGA Risk and Fraud Webinar AGA Risk and Fraud Webinar February 22, 2017 Let s Begin with the Basics 5% of revenues lost to fraud every year Median fraud duration from start to detection is 18 months Small organizations tend to suffer

More information

Visa s Approach to Card Fraud and Identity Theft

Visa s Approach to Card Fraud and Identity Theft Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting

More information

Protecting against check fraud perspectives and best practices

Protecting against check fraud perspectives and best practices Protecting against check fraud perspectives and best practices Presenter Name Corp Title, Functional Title Date of presentation 2016 Wells Fargo Bank, N.A. All rights reserved. For public use. Agenda Check

More information

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy

More information

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud Every business is susceptible to fraud But some are more susceptible than others. That

More information

2014 AFP Payments Fraud and Control Survey

2014 AFP Payments Fraud and Control Survey lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll 2014 AFP Payments Fraud and Control Survey Report of Survey Results Underwritten by 2014 AFP

More information

Ball State University

Ball State University PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1 What is

More information

1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000

1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000 In its 2008 Report to the Nation, Occupational Fraud and Abuse, the Association of Certified Fraud Examiners (ACFE) - reported losses of 7% of revenue or $994 billion of US Gross Domestic Product lost

More information

Describe Fraud in the Context of Financial

Describe Fraud in the Context of Financial Misappropriation of Assets and Fraudulent Financial Reporting Loscalzo s September 24, 2014 2012 Template for PowerPoint Slides A SmartPros Ltd. Company www.loscalzo.com (732) 741 1600 1 CPE Instructions

More information

The State of the Art of Fraud. Glenn L. Helms, Ph.D., CPA, CIA, CITP, CISA, CFF

The State of the Art of Fraud. Glenn L. Helms, Ph.D., CPA, CIA, CITP, CISA, CFF The State of the Art of Fraud Glenn L. Helms, Ph.D., CPA, CIA, CITP, CISA, CFF GlennHelmsCPA@aol.com Can You Identify Red Flags? City of Rutland, Vermont Fraud Fraud is good in good times. Fraud is good

More information

Investment Funds Transfer Audit. October 03, 2008

Investment Funds Transfer Audit. October 03, 2008 Investment Funds Transfer Audit October 03, 2008 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing

More information

minimise card fraud in your business.

minimise card fraud in your business. minimise card fraud in your business. First National Bank Tanzania Limited - a subsidiary of FirstRand Limited. A Registered Commercial Bank in Tanzania (CBA00050). There is a real possibility that your

More information

Check conversion is the process of converting a consumer check payment into an electronic payment.

Check conversion is the process of converting a consumer check payment into an electronic payment. J&B SOFTWARE ARC - FAQ ARC Frequently Asked Questions & Answers Q: What is check conversion and how does it work? Check conversion is the process of converting a consumer check payment into an electronic

More information

2017 annual fraud update:

2017 annual fraud update: 2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,

More information

Exactly what kind of bank is South State Bank?

Exactly what kind of bank is South State Bank? Business Banking Exactly what kind of bank is South State Bank? Yours. The right banking relationship can make a big difference in your success. Whether you need a new business checking account, more effective

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

2012 Payments Fraud Survey

2012 Payments Fraud Survey 2012 Payments Fraud Survey Consolidated Results Payments Information & Outreach Office Federal Reserve Bank of Minneapolis September 25, 2012 Topics Survey Methodology & Respondent Profile Fraud Attempts

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges Your Guide to Credit Card Skimming: How to Spot and Avoid Fraudulent Charges The term skimming, as applied to credit cards, involves stealing card account data during a legitimate transaction. It is then

More information

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011

Consumer Federation of America Best Practices for Identity Theft Services. March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Identity Theft Prevention Program Lake Forest College Revision 1.0

Identity Theft Prevention Program Lake Forest College Revision 1.0 Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

Crime Coverage Section Application (Large Public Company > $1B revenues)

Crime Coverage Section Application (Large Public Company > $1B revenues) Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY

More information

Combating ID Theft with the Help of Payroll Professionals

Combating ID Theft with the Help of Payroll Professionals PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

IRS UPDATES & Taxes. Security. Together.

IRS UPDATES & Taxes. Security. Together. IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud Anchin Alert: ACFE Report to the Nations 2018 The Association of Certified Fraud Examiners ( ACFE ) recently published the Report to the Nations 2018 Global Study on Occupational Fraud and Abuse (the 2018

More information

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS

Palomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair

More information

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW! Fraud in Non-profit Organizations: What You Need to Know NOW! The CFE Credential The Certified Fraud Examiner (CFE) credential denotes proven expertise in fraud prevention, detection and deterrence. CFEs

More information

Mobile Check Deposit Disclosure & Agreement

Mobile Check Deposit Disclosure & Agreement MOBILE CHECK DEPOSIT Mobile Check Deposit Disclosure & Agreement This disclosure and agreement is being provided by Allegany County Teachers Federal Credit Union in connection with your enrollment for

More information

Securing Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance

Securing Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance Securing Your Balance Sheet Fidelity/Crime Insurance Presenter: Mary da Costa, Manager, Corporate Insurance DISCLAIMER The following presentation is for general information. In all cases the terms of the

More information

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION

CYBER AND INFORMATION SECURITY COVERAGE APPLICATION NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT

More information

Polson/ Ronan Ambulance Service Identity Theft Prevention Program

Polson/ Ronan Ambulance Service Identity Theft Prevention Program Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes

More information

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data

Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report

More information

Approval version. G l o b a l P o l i c y : F r a u d R e s p o n s e a n d W h i s t l e b l o w i n g P o l i c y. Board of Directors.

Approval version. G l o b a l P o l i c y : F r a u d R e s p o n s e a n d W h i s t l e b l o w i n g P o l i c y. Board of Directors. Approval version G l o b a l P o l i c y : Issuer Author Approved by Board of Directors Group Legal Department Board of Directors Issue date July 01 2013 Revision history Publication via n/a BCnet Limitations

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND

IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and

More information

Northway Bank. Mobile Deposit Addendum. Addendum to the Online Banking Agreement

Northway Bank. Mobile Deposit Addendum. Addendum to the Online Banking Agreement Northway Bank Mobile Deposit Addendum Addendum to the Online Banking Agreement This Mobile Deposit Addendum (the Addendum ) to the Northway Bank Online Banking Agreement (the Agreement ) contains the terms

More information

Busting Fraud Rings with. Social Link Analysis

Busting Fraud Rings with. Social Link Analysis Busting Fraud Rings with Social Link Analysis Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW

More information

2017 AFP. Payments Fraud and Control Survey. Underwritten by REPORT OF SURVEY RESULTS

2017 AFP. Payments Fraud and Control Survey. Underwritten by REPORT OF SURVEY RESULTS 2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS Underwritten by 2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS March 2017 Underwritten by Association for Financial

More information

Why your PSP should be your best defence against fraud

Why your PSP should be your best defence against fraud Why your PSP should be your best defence against fraud July 2017 processing.paysafe.com Why your PSP should be your best defence against fraud If recent crime statistics have taught us anything, it s that

More information

How to combat card fraud. A guide to detecting and preventing card fraud

How to combat card fraud. A guide to detecting and preventing card fraud How to combat card fraud A guide to detecting and preventing card fraud Contents Introduction 3 Card Present fraud 4 Card Not Present fraud 6 Payment card industry data security standards Your guide to

More information

Paper Check Service Terms and Conditions

Paper Check Service Terms and Conditions Paper Check Service Terms and Conditions This document sets forth the terms and conditions ( Terms and Conditions ) for use of the Paper Check service ( Service ) offered to you ( you ) by Green Dot Bank

More information

Testimony of. Check Clearing for the 21st Century Act. before the. Subcommittee on Financial Institutions and Consumer Credit.

Testimony of. Check Clearing for the 21st Century Act. before the. Subcommittee on Financial Institutions and Consumer Credit. Testimony of America's Community Bankers American Bankers Association Consumer Bankers Association The Financial Services Roundtable Independent Community Bankers of America on Check Clearing for the 21st

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer

More information

State of Card Fraud: 2018

State of Card Fraud: 2018 State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is?... 1 Credit Versus Non-Credit Losses... 1 Learning Objectives... 2 Video Supplements...

More information

C a t a l y s t C o r p o r a t e F e d e r a l C r e d i t U n i o n SHARE DRAFT PROGRAM. Prepared by

C a t a l y s t C o r p o r a t e F e d e r a l C r e d i t U n i o n SHARE DRAFT PROGRAM. Prepared by C a t a l y s t C o r p o r a t e F e d e r a l C r e d i t U n i o n SHARE DRAFT PROGRAM Prepared by Catalyst Corporate Federal Credit Union (800)442-5763 SHARE DRAFT PROGRAM TABLE OF CONTENTS Introduction

More information

Cyber Risks & Insurance

Cyber Risks & Insurance Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of

More information

NETEXPRESS ONLINE BANKING AGREEMENT (BUSINESS) Five Star Bank

NETEXPRESS ONLINE BANKING AGREEMENT (BUSINESS) Five Star Bank NETEXPRESS ONLINE BANKING AGREEMENT (BUSINESS) Five Star Bank 1. Meaning of some words. In this agreement: a. We, us, our and ours mean Five Star Bank, 220 Liberty Street, P.O. Box 227, Warsaw, NY 14569;

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

ORGANIZATIONAL MANUAL

ORGANIZATIONAL MANUAL I. PURPOSE ORGANIZATIONAL MANUAL IDENTITY THEFT PROTECTION A. To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate Identity Theft in connection with the opening of

More information

Identity Theft Prevention Program Procedure

Identity Theft Prevention Program Procedure Identity Theft Prevention Program Procedure Procedure Number 9.6P Effective Date 6/16/2010 1.0 PURPOSE The college shall operate an Identity Theft Prevention Program (Appendix A) according to the written

More information

WHITE PAPER. The Evolution of Fraud in the Insurance Industry

WHITE PAPER. The Evolution of Fraud in the Insurance Industry WHITE PAPER The Evolution of Fraud in the Insurance Industry Introduction The insurance industry is certainly no stranger to online fraud, whether it s being directed at insurers or the consumers they

More information

Identity Fraud Endorsement

Identity Fraud Endorsement 220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity

More information

Note: Action items are italicized

Note: Action items are italicized BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background

More information

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50

Driven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50 Driven NADA Management series L50 A Dealer Guide to THE FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 The National Automobile Dealers Association (NADA) has prepared

More information

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM

EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention

More information

City National Bank & Trust Mobile Check Deposit Agreement

City National Bank & Trust Mobile Check Deposit Agreement City National Bank & Trust Mobile Check Deposit Agreement This City National Bank & Trust Mobile Check Deposit Agreement ( Mobile Check Deposit Agreement or mrdc Agreement ) sets forth the terms and conditions

More information

Anti-Fraud Policy. Version: 8.0 Approval Status: Approved. Document Owner: Graham Feek. Review Date: 07/12/2018

Anti-Fraud Policy. Version: 8.0 Approval Status: Approved. Document Owner: Graham Feek. Review Date: 07/12/2018 Anti-Fraud Policy Version: 8.0 Approval Status: Approved Document Owner: Graham Feek Classification: External Review Date: 07/12/2018 Last Reviewed: 09/12/2016 Table of Contents 1. Policy Statement...

More information

O P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between:

O P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between: O P C S (OPCS) opcs.ohio.gov 1 OPCS Overview The implementation of the Ohio Pooled Collateral System creates a unique partnership between: Treasurer s Office Financial Institutions Local Governments opcs.ohio.gov

More information

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION) TABLE OF CONTENTS SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES OCCUPATIONAL FRAUDS ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 FINANCIAL STATEMENT FRAUD What Is Financial

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Fitchburg State College Identity Theft Prevention Program updated 11/17/09

Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,

More information

PAI Secure Program Guide

PAI Secure Program Guide PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS

More information

FRAUD EXAMINERS MANUAL

FRAUD EXAMINERS MANUAL TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...

More information

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE Asset Misappropriation Peter N. Munachewa, CICA, CFIP, CFE CORPORATE FRAUD AND ABUSE CLASSIFICATION SYSTEM Corruption Asset Misappropriation Fraudulent Statements Conflicts of Interest Purchasing Schemes

More information

Clarion University Identity Theft Prevention Program

Clarion University Identity Theft Prevention Program Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered

More information

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New

Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),

More information

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud

EXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES

NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES I, Maria T. Vullo, Superintendent of Financial Services, pursuant to the

More information

Eastpointe Community Credit Union Identity Theft and Deterrence Policy

Eastpointe Community Credit Union Identity Theft and Deterrence Policy Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds

More information

PRIVACY AND CYBER SECURITY

PRIVACY AND CYBER SECURITY PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information

More information

Good From The Inside Out. Saturday, April 8, 2017

Good From The Inside Out. Saturday, April 8, 2017 Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU

More information

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial

The Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines

More information

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE

NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance

More information

Mobile Check Deposit

Mobile Check Deposit Champlain National Bank what is mobile check deposit? Mobile Check Deposit allows you to deposit checks directly into a Champlain National Bank checking, savings, or money market account by simply taking

More information

Bank Secrecy Act and OFAC Compliance Board of Directors Training

Bank Secrecy Act and OFAC Compliance Board of Directors Training Bank Secrecy Act and OFAC Compliance Board of Directors Training Introduction Today s presenters: Karen M. Janota Assurance Manager Disclaimer: The contents of this presentation are intended to provide

More information

Visa Merchant Best Practice Guide for Cardholder Not Present Transactions

Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Table of Contents Section 1 About This Guide 03 Section 2 Merchant Procedures 05 Section 3 Authorisation 07 Authorisation Procedures

More information

Visa Debit Conditions of Use

Visa Debit Conditions of Use Visa Debit Conditions of Use BEFORE YOU USE YOUR VISA CARD Please read these Conditions of Use. They apply to: all transactions initiated by you through an Electronic Banking Terminal (which in these Conditions

More information

Business Merchant Capture Agreement. A. General Terms and Conditions

Business Merchant Capture Agreement. A. General Terms and Conditions Business Merchant Capture Agreement A. General Terms and Conditions Merchant Capture (MC), the Service, allows you to deposit checks to your LGE Business Account from remote locations by electronically

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag

Policy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology

More information

Data Thefts and Protecting Client Tax Information

Data Thefts and Protecting Client Tax Information Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.

More information

Tips for Preventing Credit Card Fraud and Avoiding Chargebacks

Tips for Preventing Credit Card Fraud and Avoiding Chargebacks Tips for Preventing Credit Card Fraud and Avoiding Chargebacks Accepting credit cards is more than just a courtesy that your small business extends to its valued customers. In today s marketplace, it has

More information

CHARGEBACK GUIDE.

CHARGEBACK GUIDE. CHARGEBACK GUIDE www.globalpaymentsinc.co.uk 02 03 This step by step guide is designed to help you if you ever receive a chargeback whilst taking card payments with us. You will also find out about some

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information