Identity theft and abuse of information in fraud and corruption

Size: px
Start display at page:

Download "Identity theft and abuse of information in fraud and corruption"

Transcription

1 Identity theft and abuse of information in fraud and corruption Steven Powell FISA Conference September 2018

2 overview What is identity theft Elements of fraud The consequences The reality EFT fraud How to minimise the risk Action plan Conclusion Questions

3 What is identity theft? The unlawful use of someone else s personal information For example ID / Passport / Driver s licence death certificate marriage certificate letters of executorship salary advice municipal bill bank statements Login details - username / password Organised Crime

4 Data sources exploited in identity theft? Hacking of g-mail accounts CIPC DEEDS Natis Credit checks Case study example

5 What syndicates do with this info Fraudulent ID factories create authentic looking docs to Open new retail or credit card accounts Submit false claims/redemptions re investments insurance medical aid Impersonate you and attend to your bank and transact on your accounts open companies in your name on CIPC Change bank accounts receive tax refunds/redemptions payments

6 Change of bank account fraud This is a form of corporate identity theft Invoices intercepted in the mail Details are cloned NEW BANK ACCOUNT DETAILS are inserted Everything else looks identical and legitimate

7 How to minimise the risk There are people who gather personal information about you in order to access your funds. Therefore make sure that it is difficult for strangers to access your personal information What must I do? Shred all documents Always remain attentive at ATM s Make sure all your accounts have strong passwords that are not easy to decipher Never respond to an or sms that asks you to insert or update your personal and banking information by clicking on a website link

8 How to minimise the risk cont d Be very selective with the type of information that you share on social media sites Case study Only carry identification documentation such as your passport or identity book when it s absolutely necessary and keep these documents safely locked away when not in use.

9 Are you sharing too much? The use of social media Names of children, places of employment, places you frequent (your Facebook check-ins, birthdate all can be accessed via social media and can be used to perpetrate identify theft. Don t post pics of your holiday in the Seychelles CFO case study Make sure your privacy settings are updated!!

10 Are you a victim? Read your statements - do you see charges for things you did not buy? Watch your bank account statement - do you see withdrawals you did not make? Are there changes you do not expect? Check your mail - did you stop getting a bill? Or did you start getting a new bill you do not know about? Get your credit report - are there accounts or other information you do not recognize?

11 I ve been robbed! What do I do? Take three steps immediately: 1.Place a fraud alert on your accounts 2.Change your passwords 3.Open a criminal case with SAPS

12 The reality you will be held responsible effects your reputation effects your credit score Increases the likelihood of EFT Fraud

13 the profile of the typical fraudster White collar crime statistics reveal that more than 80% of fraud involves internal employees, most of whom have more than 5 years of service Many companies who fall victim to fraud rely on trust rather than controls The fraudster could be your most capable, most reliable & most trusted employee Generally the profile of the typical fraudster is: Older than 30, stable family situation, above average education, first offender and has been with the company for more than 5 years The fraudster is often the last person that anyone would suspect and the red flags (symptoms) that become known are often ignored due to high levels of trust

14 the fraud triangle - Psychology behind it fraud takes place when the 3 factors described below converge the fraud recipe fraud takes place when employees under pressure identify the opportunity to commit fraud - coupled to a perceived low risk of detection fraud rationalization The employee will justify committing acts of dishonesty by rationalizing his or her behaviour Rationalization takes the form of finding justification for the behaviour by relabeling to remove moral stigma

15 fraud pressures Often, formally honest employees commit fraud as a result of pressure which presents itself in a variety of ways: living beyond means insecurity regarding tenure of position, retrenchments trigger events divorce extra marital affairs medical emergency peer pressure gambling alcohol or drug problems

16 opportunity When employees experience the pressure, they often start looking for gaps or weaknesses in the control environment Opportunity to commit fraud presents itself in a variety of forms: Weak control environment Shared passwords Limited segregation of duties Limited independent review Poor management oversight Remote location High trust

17 examples of rationalizations Rationalization takes place when employees try to justify or re-label their illicit activity in order to make it seem less morally reprehensible Examples of rationalisations that have been verbalized: it was just a loan I am going to pay it back it was a spotters fee it was just a commission the company makes huge profits but does not pay us enough the company has retrenched a lot of staff I should have been promoted long ago

18 EFT fraud risk EFT fraud is essentially the diversion of funds from the organisation s bank accounts to third parties, to whom those funds are not due, usually involving manipulation of the vendor payment system This is an important risk area for FISA members to be aware of

19 electronic funds transfer fraud two methods creation of alternative vendor profile which is then selected to perform illicit transactions substitution of employee account and deletion in the 1st scenario the risk of being caught is higher as the employee info remains on the vendor profile and should be detected through proper checks

20 whose problem is EFT fraud it is invariably an account holder problem, and usually not a bank problem it is usually facilitated by password abuse within the finance team spyware and collusion with bank officials must be excluded

21 case study 1 eft payment clerk shaken not stirred 007 steals R740k from a large retailer position - eft payment clerk earnings R10k divorce weak controls fraud rationalization

22 case study 1 EFT payment clerk A junior employee in a finance team, whose role involved processing batches of vendor payments electronically, got divorced He was already battling to manage financially and now needed to pay for a messy divorce, alternative accommodation & maintenance Realised that he can authorise and release transactions with his supervisors password Made small talk with his supervisor as he was logging in, - noted his password, and voila. he could create, capture and release payments He tested thresholds with small payments to himself then waited Suspect became very bold and loaded a duplicate vendor with his personal bank account on the vendor master database Nobody noticed, and the volume and scale of his fraud escalated, within a year he had stolen just under a million

23 Case study 1: the black hole lost payment software programmers showed our suspect how to manually override the system to ensure that payments reach the intended destination every time our suspect made a legitimate payment he knew he could steal by changing a text file on his c drive I could not resist the temptation, the controls were so weak they deserved it testing thresholds

24 case study 2 chief accountant R2 million in one year modus operandi amendment of vendor banking account detail on vendor master file substituted account not own account (DRC) once illicit transaction concluded amended vendor profile deleted and vendor banking info restored to original when routine audits are performed all appears as it should where did the money go? the local casino received R1,95 million out of the R2 million stolen

25 case study 3 - FD at packaging company R4.2 mil misappropriated R1,7 in one morning substitution and deletion vehicles, houses, timeshare (house search), gambling, overseas travel, holidays, private schooling, heart operation, property for family, vehicles for close friends safety deposit boxes? 3 million rand recovery via full co-operation which translated into mitigation for an effective 5 year jail term

26 Case study 4 R4,2 million in Western Cape over 8 years Case suspect study placed 4 & personal 5 stop orders (DSTV, Telkom cars and insurance on organisation account) suspect paid for her house R1.3 million with EFT to lawyers suspect overpaid suppliers and diverted reimbursement to her account

27 what should the company have picked up? eft clerk the payments to a particular supplier whose profile was exploited was far over budget routine audits testing payroll against the vendor master files would have identified the illicit profile chief accountant password control was abused cfo signed off batches of eft s if he just counted the transactions he would have noticed that there were more payments in the batch than the paperwork reflected supplier payments were duplicate- a proper recon of each supplier against approved budget would have identified the overspend There were multiple changes to vendor banking details which is abnormal

28 key controls to prevent EFT abuse vet vendors properly (address, history, bank account, expertise & infrastructure) enforce tight control over changes to suppliers bank accounts add management authorisation audit changes to supplier banking info over the past year interrogate the changes verify with suppliers and banking institution

29 conclusion ID theft, fraud and corruption are significant risks prevention is better than cure review your anti-fraud controls annually perform control review regarding eft payments (See ENSafrica checklist) do not rely only on controls - only as effective as the people enforcing the controls recognize the symptoms do not work in a vacuum - use the tools, technology & experts 2009 S Powell

30 questions

31 Steven Powell or

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud

An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud Every business is susceptible to fraud But some are more susceptible than others. That

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

November 2017 ICPAK FORENSIC AUDIT SEMINAR

November 2017 ICPAK FORENSIC AUDIT SEMINAR November 2017 ICPAK FORENSIC AUDIT SEMINAR Introduction What is Fraud? 2 1 Insert Banner Profile of a Fraudster Introduction to Fraud A false representation of a matter of fact, whether by words or by

More information

Describe Fraud in the Context of Financial

Describe Fraud in the Context of Financial Misappropriation of Assets and Fraudulent Financial Reporting Loscalzo s September 24, 2014 2012 Template for PowerPoint Slides A SmartPros Ltd. Company www.loscalzo.com (732) 741 1600 1 CPE Instructions

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW! Fraud in Non-profit Organizations: What You Need to Know NOW! The CFE Credential The Certified Fraud Examiner (CFE) credential denotes proven expertise in fraud prevention, detection and deterrence. CFEs

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Just the facts about proving your identity.

Just the facts about proving your identity. July 2007 Our guides here to help you This guide is part of our Everyday money series. About the Financial Services Authority. Buying a home. Saving Pensions and andpensions andif things investing. retirement.

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Fraud Risk Assessment CARRIE KENNEDY, PARTNER DUSTIN BIRASHK, PARTNER

Fraud Risk Assessment CARRIE KENNEDY, PARTNER DUSTIN BIRASHK, PARTNER Fraud Risk Assessment CARRIE KENNEDY, PARTNER DUSTIN BIRASHK, PARTNER Disclaimer The material appearing in this presentation is for informational purposes only and should not be construed as advice of

More information

Good From The Inside Out. Saturday, April 8, 2017

Good From The Inside Out. Saturday, April 8, 2017 Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU

More information

Its Not About If, Its About When! Learning how to protect your organization.

Its Not About If, Its About When! Learning how to protect your organization. Learning how to protect your organization. Presentation Overview Summary off FFraud S d St Statistics ti ti Definitions of Fraud How and Why Fraud Happens Fraud Prevention and Deterrence Steps to Reducing

More information

Pockit Prepaid MasterCard General Spend Terms and Conditions of Use

Pockit Prepaid MasterCard General Spend Terms and Conditions of Use Pockit Prepaid MasterCard General Spend Terms and Conditions of Use 1. The card 1.1 These terms and conditions apply to any holder of this card ( the card ). By using your card you are demonstrating your

More information

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP

What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP LIFELOCK MEMBER EXPECTATIONS GUIDE 800-607-91744 LifeLock.com What to expect as a LifeLock member LEARN HOW TO GET THE MOST FROM YOUR MEMBERSHIP THE LIFELOCK MEMBER COMMUNICATION EXPERIENCE Signing up

More information

AGA Risk and Fraud Webinar

AGA Risk and Fraud Webinar AGA Risk and Fraud Webinar February 22, 2017 Let s Begin with the Basics 5% of revenues lost to fraud every year Median fraud duration from start to detection is 18 months Small organizations tend to suffer

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

2017 annual fraud update:

2017 annual fraud update: 2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,

More information

Stop Fraud in Your Office. Presented by: Margaret A. (Peggy) McGarrity, Esq., CPA

Stop Fraud in Your Office. Presented by: Margaret A. (Peggy) McGarrity, Esq., CPA Stop Fraud in Your Office Presented by: Margaret A. (Peggy) McGarrity, Esq., CPA 1 White-Collar Crime EDWIN H. SUTHERLAND 1939 First defined white-collar crime Criminal acts of corporations Individuals

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention Michigan Municipal Treasurers Association June 16, 2017 Scott Sternhagen, CPA Manager Ryan Ritchay, CPA, CFE Senior Accountant

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

Fraud Detection in Public Schools

Fraud Detection in Public Schools Fraud Detection in Public Schools Goal: To learn how to prevent and detect fraud from actual evidence uncovered during fraud investigations Format: We will discuss three of the largest fraud cases over

More information

Privacy Notice. 1. Who we are and our approach to your privacy

Privacy Notice. 1. Who we are and our approach to your privacy Privacy Notice 1. Who we are and our approach to your privacy In this Privacy Notice, we, us and our refers to one or more of the subsidiary companies of Sanctuary HoldCo Limited. This includes Sanctuary

More information

emoneysafe debit Mastercard Terms and Conditions of Use

emoneysafe debit Mastercard Terms and Conditions of Use debit Mastercard Terms and Conditions of Use 1. The card 1.1 These terms and conditions apply to any holder of this card ( the card ). By using your card, you are demonstrating your agreement to these

More information

SECTION 2. Preventing Financial Exploitation

SECTION 2. Preventing Financial Exploitation SECTION 2. Preventing Financial Exploitation Using legal tools to protect you and your property A guide for seniors 11 SECTION 2. Preventing Financial Exploitation Most of us think that fraud is committed

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

A Model for Calculating User-Identity Trustworthiness in Online Transactions

A Model for Calculating User-Identity Trustworthiness in Online Transactions A Model for Calculating User-Identity Trustworthiness in Online Transactions Brian A. Soeder Suzanne Barber 2015 UT CID Report #1505 This UT CID research was supported in part by the following organizations:

More information

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)

FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION) TABLE OF CONTENTS SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES OCCUPATIONAL FRAUDS ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 FINANCIAL STATEMENT FRAUD What Is Financial

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

Templeton Municipal Light and Water Plant

Templeton Municipal Light and Water Plant Templeton Municipal Light and Water Plant RED FLAG POLICY 1. POLICY It is the policy of the Templeton Municipal Light and Water Plant (TMLWP) that information compiled on all customers and employees is

More information

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814 This website is owned and/or operated by Europ Assistance USA, Inc. and is subject to the terms of use, privacy policy, and other legal notices posted on their website, which you should read before proceeding.

More information

Fraud & Financial Services

Fraud & Financial Services Fraud & Financial Services Understanding the 2017 Criminal Finances Bill This course can be presented in-house for you on a date of your choosing The Banking and Corporate Finance Training Specialist Course

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

Medical Identity Theft Prevention Policy

Medical Identity Theft Prevention Policy SUBJECT: NUMBER: EFFECTIVE DATE: SUPERSEDES SPP: APPROVED BY: DISTRIBUTION: Medical Identity Theft Prevention Policy (signature) DATED: I. STATEMENT OF PURPOSE: To define medical identity theft and outline

More information

Identity Protection Services

Identity Protection Services Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading

More information

Making cards work for you. A public education campaign brought to you by MasterCard

Making cards work for you. A public education campaign brought to you by MasterCard Making cards work for you A public education campaign brought to you by MasterCard At school or work paying bills, renting an apartment or shopping for a new car, you need to know how cards save you money

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

TRAVELLING SHOULDN T COST YOU THE EARTH USER GUIDE

TRAVELLING SHOULDN T COST YOU THE EARTH USER GUIDE TRAVELLING SHOULDN T COST YOU THE EARTH USER GUIDE Travelling shouldn t cost you the earth. Cash Passport Globe the smart card for savvy travellers Here you will find everything you need to know about

More information

OAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1

OAPT June 9, Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1 OAPT June 9, 2015 Deterring Fraud and the Latest Fraud Schemes in Public Entities TAKE AWAY #1 Fraud can happen at any entity, at any time with the right circumstance Be Vigilant and Skeptical of what

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

A Losing Bet: Binary Options

A Losing Bet: Binary Options A Losing Bet: Binary Options What are Binary Options? Binary options the latest investment scam that s costing victims everything. - CBC, March 2017 Binary Options are a sort of wager where investors bet

More information

The Smartest Employee Benefit Is Identity Theft Management

The Smartest Employee Benefit Is Identity Theft Management The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

MASTHAVEN BANK FIXED RATE BOND TERMS AND CONDITIONS

MASTHAVEN BANK FIXED RATE BOND TERMS AND CONDITIONS MASTHAVEN BANK FIXED RATE BOND TERMS AND CONDITIONS These terms and conditions ("conditions") contain basic information about us, Masthaven Bank Limited, our services, and our agreement with you, the account

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities.

Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. Deluxe Provent SM : Protecting against expanded threats. Providing for expanded opportunities. deluxe growth services introduction Identity thieves are extending beyond credit relationships and are more

More information

A Losing Bet: Binary Options

A Losing Bet: Binary Options A Losing Bet: Binary Options What are Binary Options? Binary Options are a sort of wager where investors bet on the performance of an underlying asset, often a currency, stock index, or share, usually

More information

Catch Me If You Can. Fraud in Local Government. CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division

Catch Me If You Can. Fraud in Local Government. CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division Catch Me If You Can Fraud in Local Government CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division Steve Flaherty, Principal Investigator 10.03.2018 2 Disclaimer Any names or incidents

More information

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards

Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM Cards Selected Terms & Conditions for Wells Fargo Consumer Debit and ATM s Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your page 2 Using Your Through a Mobile Device page 4 One-Time

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

Privacy Policy. HDI Global SE - UK

Privacy Policy. HDI Global SE - UK Privacy Policy HDI Global SE - UK Privacy Policy Your privacy is very important to us. We promise to respect and protect your personal information and try to make sure that your details are accurate and

More information

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION

UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION UNIVERSITY OF DENVER POLICY MANUAL IDENTITY THEFT PREVENTION Responsible Department: Provost and Business and Financial Affairs Recommended By: Provost, VC Business and Financial Affairs Approved By: Chancellor

More information

Lecture Notes for How to Steal $500 Million

Lecture Notes for How to Steal $500 Million Lecture Notes for How to Steal $500 Million These notes will be in the form of questions that you should try to answer while watching the video. The purpose is to make certain that you are paying attention

More information

CONTENTS INTRODUCTION ABBREVIATIONS/ACRONYMS

CONTENTS INTRODUCTION ABBREVIATIONS/ACRONYMS TYPOLOGIES ISSUED MAY 2018 1 CONTENTS INTRODUCTION... 2 UTILISATION OF THIRD PARTY ACCOUNTS... 3 CHANGING OF BANK DETAILS FRAUD... 4 PROCEEDS LAUNDERED THROUGH CASINOS... 5 CORRUPTION... 6 NARCOTICS...

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Terms and Conditions for Current, Demand Deposit and Masterplan Accounts

Terms and Conditions for Current, Demand Deposit and Masterplan Accounts Terms and Conditions for Current, Demand Deposit and Masterplan Accounts This document contains important information. Please read carefully and retain for future reference. January 2018 2 Current, Demand

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

Online Personal Demand Deposit Account Terms and Conditions

Online Personal Demand Deposit Account Terms and Conditions Online Personal Demand Deposit Account Terms and Conditions 1. Your Agreement 1.1 These terms and conditions are additional to the terms and conditions for our Current, Demand Deposit and Masterplan Accounts

More information

Anti-Fraud Policy Date: Version: Review Date:

Anti-Fraud Policy Date: Version: Review Date: Anti-Fraud Policy Date: July 2017 Version: 4.0 Review Date: July 2019 Policy Title Anti-Fraud Policy Policy Number: POL 022 Version 4.0 Policy Sponsor Policy Owner Committee Chief Executive Director of

More information

protecting yourself Money Management SESSION #6

protecting yourself Money Management SESSION #6 Money Management SESSION #6 protecting yourself The Money Management sessions have been developed for the HSBC Opportunity Partnership in collaboration with Catch22, St Giles Trust, The Prince's Trust,

More information

ANTI-FRAUD STRATEGY INTERREG IPA CBC PROGRAMMES BULGARIA SERBIA BULGARIA THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA BULGARIA TURKEY

ANTI-FRAUD STRATEGY INTERREG IPA CBC PROGRAMMES BULGARIA SERBIA BULGARIA THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA BULGARIA TURKEY ANTI-FRAUD STRATEGY INTERREG IPA CBC PROGRAMMES 2014-2020 BULGARIA SERBIA BULGARIA THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA BULGARIA TURKEY VERSION NOVEMBER 2016 1 TABLE OF CONTENTS PRINCIPLE 3 FOREWORD

More information

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES For Government Entities and Nonprofit Organizations November 15, 2017 Presenters Bruce V. Bush Bruce is a Senior Director in RSM s Financial Investigations

More information

Crime Coverage Section Application (Large Public Company > $1B revenues)

Crime Coverage Section Application (Large Public Company > $1B revenues) Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY

More information

Identity Theft Prevention Program

Identity Theft Prevention Program Slide 1 Identity Theft Prevention Program Welcome to the Identity Theft Prevention Program annual training course. Your personal identification information can be used by individuals seeking to use your

More information

! The rental agreement is governed by the law of the country where you pick-up the BOOKING CONDITIONS. 1. Making a booking

! The rental agreement is governed by the law of the country where you pick-up the BOOKING CONDITIONS. 1. Making a booking BOOKING CONDITIONS Please read this document before you complete our booking as it provides important information about your booking and your rental, including what to bring with you when you pick up the

More information

Cyber Insecurity - Making Sense of Payment Fraud

Cyber Insecurity - Making Sense of Payment Fraud Cyber Insecurity - Making Sense of Payment Fraud James Richardson Head of Pre-Sales & Consulting Thursday 23 February 2017 BCS, Chartered Institute for IT Businesses and Banks rely on Bottomline for domestic

More information

APPENDIX 2 CORPORATE ANTI-FRAUD AND CORRUPTION STRATEGY

APPENDIX 2 CORPORATE ANTI-FRAUD AND CORRUPTION STRATEGY APPENDIX 2 CORPORATE ANTI-FRAUD AND CORRUPTION STRATEGY January 2017 CONTENTS Section Page 1 Introduction 3 2 Definition of Fraud 3 3 Standards 4 4 Corporate Framework and Culture 4 5 Roles and Responsibilities

More information

MANAGING FINANCIAL CRIME RISK : A PRIMER FOR CHARITIES AND NOT-FOR-PROFITS

MANAGING FINANCIAL CRIME RISK : A PRIMER FOR CHARITIES AND NOT-FOR-PROFITS MANAGING FINANCIAL CRIME RISK : A PRIMER FOR CHARITIES AND NOT-FOR-PROFITS Issued by The Hongkong and Shanghai Banking Corporation Limited Index FOREWORD Foreword 02 SECTION 1 Your responsibilities 03

More information

Weber State University. Cash Handling Training

Weber State University. Cash Handling Training Weber State University Cash Handling Training Cash Handling It s your responsibility Whether you take in a lot of money or you collect pennies ..it is important to maintain good cash handling procedures:

More information

Have you dealt with fraud in the past?

Have you dealt with fraud in the past? Birmingham CPE Seminar Birmingham, Alabama August 17, 2017 Fraud: Real People, Real Schemes Roy Strickland, CPA/CFF, CFE, MAFF 1 Polling Question Have you dealt with fraud in the past? 2 DHG Birmingham

More information

MONROE COUNTY SHERIFF S OFFICE. General Order

MONROE COUNTY SHERIFF S OFFICE. General Order MONROE COUNTY SHERIFF S OFFICE General Order CHAPTER: 34 - D EFFECTIVE DATE: August 19, 2009 REFERENCE: CALEA 42.2.8 NO. PAGES: 8 TITLE: Identification Theft Investigation Procedures AMENDED: RESCINDS:

More information

Financial Accounting, 1e Chapter 6: Ethics, Internal Control, and IFRS Test Item File

Financial Accounting, 1e Chapter 6: Ethics, Internal Control, and IFRS Test Item File Financial Accounting, 1e Chapter 6: Ethics, Internal Control, and IFRS Test Item File 6.0-1 Some accounting professionals believe that GAAP may have contributed to the accounting scandals as early as the

More information

ACC3FOA CHAPTER 1 THE NATURE OF FRAUD

ACC3FOA CHAPTER 1 THE NATURE OF FRAUD Civil Law Customer Fraud Employee Embezzlement Evidential Matter Financial Statements Fraud Investment Scams Jurisdiction Management Fraud Miscellaneous Fraud Net Income Perpetrators Profit Margin Revenue

More information

Corruption prevention, fraud and technology

Corruption prevention, fraud and technology Corruption prevention, fraud and technology Paul Alsbury Senior Executive Officer, Corruption Presented to: IAG 2018 Conference 21 November 2018 Crime and Corruption Commission The CCC is an independent

More information

POLICY: FRAUD PREVENTION. October 2017

POLICY: FRAUD PREVENTION. October 2017 POLICY: October 2017 CONTENTS 1. PURPOSE P3 2. SCOPE P3 3. LEGISLATION AND CORPORATE GOVERNANCE REQUIREMENTS REFERENCE 4. POLICY STATEMENT AND INTERNAL STANDARDS P3 P4 4.1 Background P4 4.2 Actions constituting

More information

Group Personal Pension Plan

Group Personal Pension Plan Group Personal Pension Plan Application Application notes The information that you provide on this form will be used to assess your application and you must therefore provide complete and correct information

More information

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information

More information

Financial Crime - Early Warning Signs the role of Internal Audit in recognizing red flags

Financial Crime - Early Warning Signs the role of Internal Audit in recognizing red flags Forensic Services Financial Crime - Early Warning Signs the role of Internal Audit in recognizing red flags 2 What % of revenues are lost to fraud? 5% Source: 2016 ACFE Report to the Nations 3 Has your

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

Fraud and corruption prevention and control policy of the International Federation of Red Cross and Red Crescent Societies

Fraud and corruption prevention and control policy of the International Federation of Red Cross and Red Crescent Societies www.ifrc.org Saving lives, changing minds. Fraud and corruption prevention and control policy of the International Federation of Red Cross and Red Crescent Societies Document Issued On: [insert date] Approved

More information

Increase Effectiveness in Combating VAT Carousels

Increase Effectiveness in Combating VAT Carousels Increase Effectiveness in Combating VAT Carousels Detect, Prevent and Manage WHITE PAPER SAS White Paper Contents Overview....1 The Challenges...1 Capabilities...2 Scoring...3 Alert and Case Management....3

More information

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards

Selected Terms & Conditions for Wells Fargo Business Debit, ATM and Deposit Cards Selected Terms & Conditions for Wells Fargo Debit, ATM and Deposit Cards Terms and Conditions effective 04/24/2017. Introduction page 1 Using Your Card page 2 Using Your Card Through a Mobile Device page

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath MMAAA Annual Meeting Conducting an Investigative Audit June 13, 2017 Presented by: John J. Sullivan, CFE Melanson Heath Association of Certified Fraud Examiners 2016 Global Fraud Study Figure 1. Statistics

More information

MEDICAL IDENTITY THEFT Presented by:

MEDICAL IDENTITY THEFT Presented by: MEDICAL IDENTITY THEFT Presented by: Tami Flemmer, Risk Management Director Melissa Hauer, Corporate Counsel Ernie Thurman, Security Coordinator October 8, 2014 Medical Identity Theft OVERVIEW OF PRESENTATION

More information

netwise INTERNET BANKING APPLICATION FORM - CORPORATE

netwise INTERNET BANKING APPLICATION FORM - CORPORATE PBL/eB/04-C netwise INTERNET BANKING APPLICATION FORM - CORPORATE Please complete in block letters; tick where applicable. 1. COMPANY DETAILS Indicate Your Branch Account Name: Postal Address: (same as

More information

How to combat card fraud. A guide to detecting and preventing card fraud

How to combat card fraud. A guide to detecting and preventing card fraud How to combat card fraud A guide to detecting and preventing card fraud Contents Introduction 3 Card Present fraud 4 Card Not Present fraud 6 Payment card industry data security standards Your guide to

More information

Heerema Marine Contractors

Heerema Marine Contractors Heerema Marine Contractors ANTI-FRAUD POLICY Date of issue September 2012 Version 2012.02 Document HMC L055 Summary HMC requires its staff at all times to act honestly and with integrity in order to safeguard

More information

General Terms and Conditions

General Terms and Conditions Effective 14 December 2017 What you need to know about these terms and conditions This booklet sets out the terms and conditions that apply to the accounts, products, or services we provide. It includes

More information

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE Asset Misappropriation Peter N. Munachewa, CICA, CFIP, CFE CORPORATE FRAUD AND ABUSE CLASSIFICATION SYSTEM Corruption Asset Misappropriation Fraudulent Statements Conflicts of Interest Purchasing Schemes

More information