KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud
|
|
- Gladys Robbins
- 5 years ago
- Views:
Transcription
1 KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud Inside: Fraud: A Problem That Won t Go Away How Criminals Exploit Vulnerabilities In Treasury Practices Fraud Prevention From An Enterprise Perspective Vigilance: Your First Line Of Defense Fraud Is Real You Are Not Alone We Can Help
2 executive summary: Fraud rings are better organized and more technologically sophisticated than ever before. Enterprise USA 2008 Enterprise USA 2008 Fraud: A Problem That Won t Go Away At this very moment, businesses like yours are being targeted by criminals whose sole intent is to obtain funds by illegal means. Operating both individually and in well-organized rings, these corrupt and calculating individuals have learned to identify and exploit weaknesses that victims often overlook. Hidden in plain sight among employees, associates and the population at large the perpetrators of payment fraud rob American enterprise of billions of dollars each year. In fact, the Association of Certified Fraud Examiners (ACFE) calculates annual losses due to fraud at $652 billion,* or approximately 5 percent of the nation s Gross Domestic Product. Are you vulnerable? In a recent survey conducted by the Association for Financial Professionals (AFP), 72 percent of all participating organizations reported that they had been the victims of attempted or actual payment fraud.** And, unfortunately, fraud appears to be a growth industry. In a roundtable discussion held by the Federal Reserve Bank, participants reported that costs associated with this steadily growing problem are not only substantial, but increasing as the incidence of fraud continues to escalate. The hidden costs. The cost of fraud is not limited to direct losses. Also significant are the many expenses associated with investigative efforts and attempts to recover lost funds. Less quantifiable, but potentially even more damaging, is the negative impact of
3 ACH Fraud: The profile of a victim. The AFP finds that organizations with annual revenues under $1 billion are nearly three times more likely to sustain financial losses due to ACH fraud than are businesses with revenues over the $1 billion mark. In examining the statistics, the reason for this significant disparity becomes readily apparent: larger institutions are much more likely to implement fraud prevention solutions. successful fraud attacks on the public image of victim organizations. If victimized by fraud, you can expect to spend over 175 hours filling out insurance claims, police reports and affidavits, and in completing numerous other timeconsuming tasks in an attempt to repair the damage. Added to the time and expense of correcting fraudulent activity, the cost of each incident typically exceeds $3,000. Alliance: Joining forces on multiple fronts. Clearly, to prevail in the battle against fraud, organizations must take a proactive stance. Today, businesses and institutions are actively engaging in building alliances with financial institutions that can provide the expertise to pinpoint vulnerabilities and structure solutions that can help to defend the organization against fraud and from the losses it can cause. How Criminals Exploit Vulnerabilities In Treasury Practices Fraud is as old as commerce itself but as the technology of treasury management has evolved, so too have the methods used to perpetrate it. Today, the level of sophistication among those who conspire to commit fraud is alarmingly high. Disaffected and cunning, techsavvy criminals arm themselves with an insider s understanding of treasury management practices and set forth to defraud the organizations that drive our economy. The costs are immense. Fortunately, banking services designed to protect organizations against fraud also continue to evolve as well. The following are several of the many ways criminals endeavor to exploit vulnerabilities in treasury practices. The most frequent targets. Despite the declining use of checks, check fraud continues to increase and is still the most prevalent form of payment fraud by a significant margin. In fact, 41 percent of all organizations responding to the AFP study reported an increase in the incidence of check fraud.** Other frequent targets of payment fraud are: Automated Clearing House (ACH) Credit and debit cards Wire transfers Technology: The criminal s toolbox. At first glance, check fraud may seem relatively low-tech. But forged signatures and altered payable amounts are just the beginning. Current methodologies are as advanced as today s technology. One of the fastestgrowing types of check fraud involves the production of counterfeit checks. Using tools that are readily available including desktop publishing software, color copiers and high-end printers counterfeiters produce replications of genuine checks that are both convincing and effective in producing the intended result. Criminals also commit check fraud by: Stealing employee paychecks, reimbursement checks and rebate checks. Continued on next page.
4 Understanding your exposure. It is often assumed that financial institutions are responsible for losses resulting from fraud. However, an organization may be held responsible in some instances for example, if it failed to reconcile accounts and/or identify and return fraudulent items in a timely manner. Financial responsibility is determined on a caseby-case basis, depending on the facts of the case and applicable law. Responsibility may be linked to the entity determined to have been in a position to take preventive action, but which did not do so. You should seek the advice of your legal counsel regarding responsibility for fraud. Taking advantage of checkconversion loopholes at unprotected financial institutions. Criminals obtain account and routing numbers from checks and use this information to initiate payments typically via phone or the Internet that are presented electronically as ACH transactions. Fraud in the electronic realm. As Automated Clearing House transactions and other electronic payment methods have gained increasing acceptance, so too has the incidence of electronic fraud. Rapidly assimilating these new and emergent electronic payment technologies, the criminally opportunistic relentlessly continue to pursue their victims in the electronic realm. With the proliferation of phishing schemes and online trojan attacks, organizations must acknowledge the necessity of protecting access to account information. Today, expertly crafted phishing s, which are used to fraudulently obtain passwords and other account information, are one of the most damaging weapons in the criminal toolbox. Trojans, which harvest account data automatically and all too often without being detected are also responsible for significant financial losses. The potential for loss due to trojans is expected to continue to increase over time, as these malicious programs become more sophisticated. Respondents to the AFP survey report that over a third of the fraud attempts made against their organizations involved ACH transactions.** And among organizations that were found to be financially responsible for losses due to fraud, more than half did not use ACH debit blocks or filters. Another 22 percent of ACH fraud attempts were successful because the organization had not reconciled its accounts or returned payments on a timely basis. And 17 percent of victim organizations reported that the source of fraud could be traced to persons within their own organizations. Beware the inside job. How do you identify a criminal who has penetrated your defenses? The answer may not be so obvious. According to data collected by the ACFE, less than 8 percent of prosecutable suspects had been convicted of any crime prior to committing internal fraud. The costs of internal fraud can be staggering. The ACFE finds that the median loss due to internal fraud is $159,000 per incident.* And nearly 25 percent of all reported internal fraud cases resulted in losses of at least $1 million. Among the most frequent types of internal fraud are asset appropriation schemes involving invoicing, expense reimbursements, check tampering and payroll. Small to mid-sized businesses are particularly susceptible to internal fraud and suffer disproportionate losses as compared to larger organizations.
5 Fraud Prevention From An Enterprise Perspective Taking the offensive: A multidimensional strategy. Safeguarding the organization s cash flow and profits has long been the role of the corporate treasury department. However, as fraud continues to grow in scope and sophistication, the need to manage this threat has never been greater. To effectively combat fraud, forward-thinking organizations must adopt multidimensional strategies that function in synergy with their existing initiatives. And because fraud can be expansive across an entire organization, it is also essential to engage internal partners by communicating concerns and sharing observations. Combating fraud: The essentials. Combating fraud isn t simple, but it is possible if managed effectively. KeyBank recommends that you begin with these essential activities: Segregate duties. Designate one person to make payments and another person to reconcile, to help decrease the potential for internal fraud. Reconcile on a timely basis. The more frequently you reconcile, the sooner you ll be able to identify any unusual check or ACH transactions. Utilize electronic processes. Use online reporting to enable faster reconcilement and authorization decisions for questionable/red-flagged items. Also, consider issuing rebates and refunds as electronic transactions, and use direct deposit for payroll. Protect account information, user IDs and passwords. Account numbers, routing numbers and other relevant account details are gold to criminals who attempt to commit fraud. Instruct employees in the protection of secure information and teach them to recognize phishing s and other attempts to obtain sensitive data. Implement fraud prevention solutions. Implement bank-provided treasury management solutions that can help to mitigate fraud through early detection and safeguard against erroneous postings. Use two-factor authentication to strengthen transactionlevel security. Verify user identity with a user ID and password, plus a stronger factor such as a digital certificate. Defending against check fraud. Dealing with fraudulent checks is costly, not only in terms of the actual loss, but in terms of expenses related to remediation. The following strategies are fundamental to a successful anti-fraud initiative: Identify altered payee names and payable amounts, forged signatures and fraudulently replicated checks. Detecting unauthorized checking activity, automatically identifying questionable items and providing the option to either approve or reject these items are important safeguards Continued on next page.
6 against altered or fraudulent checks. An effective tool in managing these scenarios is positive pay. An extra layer of protection, known as payee positive pay, is provided by comparing the payee name on presented checks to an electronic list submitted by the client organization. This feature helps to ensure authenticity by automatically reporting all exceptions, and allowing the client to make the desired dispositions. Because many financial institutions do not offer this service, it is important to determine availability. Identify fraudulent activity rapidly. The more quickly fraudulent activity is identified, the more likely it is that you can prevent it. This is why it is imperative to reconcile accounts on a timely basis. By doing so, your organization can identify exceptions that may be fraudulent and take appropriate action before financial damage can result. Enterprise USA Use automated account reconcilement. This is an effective alternative to traditional reconcilement methods. It provides detailed checking account information that reduces the time needed to reconcile accounts and enables you to identify fraudulent activity sooner. Typically, organizations choose from one of two distinct levels of account reconcilement: 2008 Partial reconcilement provides a list of paid checks in numerical order. Check serial numbers, dollar amounts, dates paid and sequence numbers are displayed within this concise, easy-to-read report. Full reconcilement in addition to a list of paid checks, it provides an itemized report of outstanding checks and exception items. Keep paper checks out of the wrong hands. Paper checks, when stolen or altered, can provide a direct route into your accounts. One of the best ways to keep them out of the hands of criminals is to archive checks as digital images and store them on CD-ROM or other digital media. This process enables organizations to easily manage, retrieve and view images on demand. Typically, archived check images include the front and back of each check, providing a visual record of the signature, endorsement and/or bank of first deposit. Automated account reconcilement reports and bank statements are also frequently imaged for archival purposes. Make it more difficult to counterfeit your checks. One of the more effective ways to reduce check fraud is to utilize enhanced check stock security features, including microprinting, dualcolor gradients, watermarked security tags and photocopy prevention markings. To further complicate the efforts of counterfeiters, limit access to sensitive account information and check stock. Often, the most cost-effective way to achieve these objectives is to outsource check production.
7 Safeguarding the ACH process. Automated Clearing House (ACH) payments present new and potentially lucrative opportunities for criminals. To help protect against fraudulent ACH transactions, organizations need to carefully monitor electronic account activity. In addition to reconciling accounts daily, the primary solutions in the battle against ACH fraud are ACH blocks and filters. Designed to protect against unauthorized electronic ACH debits, these methods enable users to authorize specific ACH debits or block all ACH debits to their accounts. Users can select the level of protection that best fits their organizations: Matching all ACH debits against a pre-approved account list provided by the client to determine if the debit should be paid. Receiving a daily exception report of all unauthorized attempts to debit protected accounts, including an option to pay or not pay each item on the list or place a block on an account. Rejecting all ACH debits attempting to post to a specified account. ACH block and filter reports are often available via fax, or the Internet. Closing the loopholes between digital and traditional payment methods. To be effective, your fraud protection initiative needs to close the loopholes that can open when checks are presented as ACH payments. Positive Pay and ACH block and filter solutions should be structured to work hand-in-hand including the verification of payee name for electronic items to identify questionable transactions and to return suspicious items upon presentment. Because not all financial institutions offer this level of integration, it is important to evaluate carefully when selecting a solutions provider. Vigilance: Your First Line Of Defense Fact #1: No amount of planning and oversight will ever completely eliminate fraud. The bad guys are just that good. Fact #2: Criminals look for easy targets, so if an account is protected, it becomes a far less attractive target for would-be criminals. This is particularly true in the case of internal fraud, especially when members of the organization know that fraud prevention measures are in use. Fact #3: With a well-conceived, well-executed system in place, you have the potential to reduce fraud to a point at which it becomes a negligible nuisance, and perhaps even eradicate it for considerable periods of time all without incurring unreasonable cost. The right blend of process and technology. It s time to take a proactive stance against fraud. KeyBank can help you formulate a strategy designed to address your needs. Contact Key today to discuss your fraud strategy and to obtain recommendations specific to your organization.
8 For more information, visit key.com/globaltreasury. SM *Association of Certified Fraud Examiners (ACFE), 2006 Report to the Nation on Occupational Fraud & Abuse **Association for Financial Professionals (AFP), 2007 AFP Payments Fraud Survey: Report of Survey Results, 2007 Federal Trade Commission. Identity Theft Clearing House, 2002 The American Bankers Association. Deposit Account Fraud Survey Report, 2004 This document is designed to provide general information only and is not legal advice. If legal advice or other expert assistance is required, the services of a competent professional should be sought. KeyBank does not make any warranties regarding the results obtained from the use of this information.
mitigating Payments Fraud risk:
HigHer education banking mitigating Payments Fraud risk: Strategies and best Practices for Higher education institutions 2 Mitigating Payments Fraud Risk: Strategies and Best Practices for Higher Education
More informationEverything You Didn t Want To Know About Employee Crime
Everything You Didn t Want To Know About Employee Crime It's something employers don't want to have to think about: employee crime. Finding out that trusted, long-term employees have been stealing from
More informationInsuring! Agreement Claim! Scenario Coverage! Response Network &! Information! Security Liability A hacker successfully obtains sensitive, personal information from the insured s computer system. As a
More informationFRAUD EXAMINERS MANUAL INTERNATIONAL EDITION
TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...
More informationMMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath
MMAAA Annual Meeting Conducting an Investigative Audit June 13, 2017 Presented by: John J. Sullivan, CFE Melanson Heath Association of Certified Fraud Examiners 2016 Global Fraud Study Figure 1. Statistics
More informationFRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools
FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting
More informationAGA Risk and Fraud Webinar
AGA Risk and Fraud Webinar February 22, 2017 Let s Begin with the Basics 5% of revenues lost to fraud every year Median fraud duration from start to detection is 18 months Small organizations tend to suffer
More informationVisa s Approach to Card Fraud and Identity Theft
Visa s Approach to Card Fraud and Identity Theft Paul Russinoff June 7, 2007 Discussion Topics Visa s Comprehensive Security Approach Multiple Layers Commitment to Cardholders Consumer Tips Protecting
More informationProtecting against check fraud perspectives and best practices
Protecting against check fraud perspectives and best practices Presenter Name Corp Title, Functional Title Date of presentation 2016 Wells Fargo Bank, N.A. All rights reserved. For public use. Agenda Check
More informationChart 1 How Fraudulently Used Consumer Information is Obtained M A Y
M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy
More informationAn overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud
An overview of the fraud threat to business, including the particular threat posed by electronic funds transfer fraud Every business is susceptible to fraud But some are more susceptible than others. That
More information2014 AFP Payments Fraud and Control Survey
lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll 2014 AFP Payments Fraud and Control Survey Report of Survey Results Underwritten by 2014 AFP
More informationBall State University
PCI Data Security Awareness Training Agenda What is PCI-DSS PCI-DDS Standards Training Definitions Compliance 6 Goals 12 Security Requirements Card Identification Basic Rules to Follow Myths 1 What is
More information1/3/2013. Months. Other $75,000. Government $81,000. Non-Profit $100,000. Dollars. Public Company $127,000. Private Company $200,000
In its 2008 Report to the Nation, Occupational Fraud and Abuse, the Association of Certified Fraud Examiners (ACFE) - reported losses of 7% of revenue or $994 billion of US Gross Domestic Product lost
More informationDescribe Fraud in the Context of Financial
Misappropriation of Assets and Fraudulent Financial Reporting Loscalzo s September 24, 2014 2012 Template for PowerPoint Slides A SmartPros Ltd. Company www.loscalzo.com (732) 741 1600 1 CPE Instructions
More informationThe State of the Art of Fraud. Glenn L. Helms, Ph.D., CPA, CIA, CITP, CISA, CFF
The State of the Art of Fraud Glenn L. Helms, Ph.D., CPA, CIA, CITP, CISA, CFF GlennHelmsCPA@aol.com Can You Identify Red Flags? City of Rutland, Vermont Fraud Fraud is good in good times. Fraud is good
More informationInvestment Funds Transfer Audit. October 03, 2008
Investment Funds Transfer Audit October 03, 2008 The Office of the City Auditor conducted this project in accordance with the International Standards for the Professional Practice of Internal Auditing
More informationminimise card fraud in your business.
minimise card fraud in your business. First National Bank Tanzania Limited - a subsidiary of FirstRand Limited. A Registered Commercial Bank in Tanzania (CBA00050). There is a real possibility that your
More informationCheck conversion is the process of converting a consumer check payment into an electronic payment.
J&B SOFTWARE ARC - FAQ ARC Frequently Asked Questions & Answers Q: What is check conversion and how does it work? Check conversion is the process of converting a consumer check payment into an electronic
More information2017 annual fraud update:
2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,
More informationExactly what kind of bank is South State Bank?
Business Banking Exactly what kind of bank is South State Bank? Yours. The right banking relationship can make a big difference in your success. Whether you need a new business checking account, more effective
More informationTax-Related Identity Theft
Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman
More informationJason B. Freeman, J.D., CPA
Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman
More information2012 Payments Fraud Survey
2012 Payments Fraud Survey Consolidated Results Payments Information & Outreach Office Federal Reserve Bank of Minneapolis September 25, 2012 Topics Survey Methodology & Respondent Profile Fraud Attempts
More informationYear-end 2016 fraud update: Payment cards, remote banking and cheque
Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments
More informationYour Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges
Your Guide to Credit Card Skimming: How to Spot and Avoid Fraudulent Charges The term skimming, as applied to credit cards, involves stealing card account data during a legitimate transaction. It is then
More informationConsumer Federation of America Best Practices for Identity Theft Services. March 10, 2011
Consumer Federation of America Best Practices for Identity Theft Services March 10, 2011 Consumer Federation of America Best Practices for Identity Theft Services Table of Contents Introduction 3 About
More informationLearn about identity theft. Investor education
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationIdentity Theft Prevention Program Lake Forest College Revision 1.0
Identity Theft Prevention Program Lake Forest College Revision 1.0 This document supersedes all previous identity theft prevention program documents. Approved and Adopted by: The Board of Directors Date:
More informationJanuary to June 2016 fraud update: Payment cards, remote banking and cheque
January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.
More informationc» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:
Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security
More informationCrime Coverage Section Application (Large Public Company > $1B revenues)
Crime Coverage Section Application (Large Public Company > $1B revenues) BY COMPLETING THIS CRIME APPLICATION THE APPLICANT IS APPLYING FOR COVERAGE WITH CHUBB INSURANCE COMPANY OF CANADA (THE COMPANY
More informationCombating ID Theft with the Help of Payroll Professionals
PENNSYLVANIA STATEWIDE PAYROLL CONFERENCE Indiana University Of Pennsylvania Philip G. Yamalis Senior Stakeholder Liaison October 7, 2016 Future State Resources for Payroll Professionals Combating ID Theft
More informationOLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE
OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS
More informationIRS UPDATES & Taxes. Security. Together.
IRS UPDATES & Taxes. Security. Together. Dennis Bell Senior Stakeholder Liaison CATA February 3, 2016 Issue 5: Online Tools for Tax Professionals 1 Keeping Current Preparer Guidelines 2 Other Tax Pro Links
More informationRecognizing Credit Card Fraud
1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended
More informationTable 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud
Anchin Alert: ACFE Report to the Nations 2018 The Association of Certified Fraud Examiners ( ACFE ) recently published the Report to the Nations 2018 Global Study on Occupational Fraud and Abuse (the 2018
More informationPalomar Community College District Procedure AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS
1 STUDENT SERVICES 2 3 AP 5900 PREVENTION OF IDENTITY THEFT IN STUDENT FINANCIAL TRANSACTIONS 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 References: Fair
More information11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!
Fraud in Non-profit Organizations: What You Need to Know NOW! The CFE Credential The Certified Fraud Examiner (CFE) credential denotes proven expertise in fraud prevention, detection and deterrence. CFEs
More informationMobile Check Deposit Disclosure & Agreement
MOBILE CHECK DEPOSIT Mobile Check Deposit Disclosure & Agreement This disclosure and agreement is being provided by Allegany County Teachers Federal Credit Union in connection with your enrollment for
More informationSecuring Your Balance Sheet Fidelity/Crime Insurance. Presenter: Mary da Costa, Manager, Corporate Insurance
Securing Your Balance Sheet Fidelity/Crime Insurance Presenter: Mary da Costa, Manager, Corporate Insurance DISCLAIMER The following presentation is for general information. In all cases the terms of the
More informationCYBER AND INFORMATION SECURITY COVERAGE APPLICATION
NOTICE: THIS APPLICATION IS FOR CLAIMS-MADE AND REPORTED COVERAGE, WHICH APPLIES ONLY TO CLAIMS FIRST MADE AND REPORTED IN WRITING DURING THE POLICY PERIOD, OR ANY EXTENDED REPORTING PERIOD. THE LIMIT
More informationPolson/ Ronan Ambulance Service Identity Theft Prevention Program
Purpose Polson/ Ronan Ambulance is committed to providing all aspects of our service and conducting our business operations in compliance with all applicable laws and regulations. This policy sets forth
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements 2016 Association of Certified Fraud Examiners, Inc. Fraudulent Disbursement Schemes Register disbursement schemes
More informationSixth Annual Benchmark Study on Privacy & Security of Healthcare Data
Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data Sponsored by ID Experts Independently conducted by Ponemon Institute LLC Publication Date: May 2016 Ponemon Institute Research Report
More informationApproval version. G l o b a l P o l i c y : F r a u d R e s p o n s e a n d W h i s t l e b l o w i n g P o l i c y. Board of Directors.
Approval version G l o b a l P o l i c y : Issuer Author Approved by Board of Directors Group Legal Department Board of Directors Issue date July 01 2013 Revision history Publication via n/a BCnet Limitations
More informationProtect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently
Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity
More informationIV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND
IV:07:11 IDENTITY THEFT PREVENTION POLICY SECTION 1: BACKGROUND The risk to Volunteer State Community College ( College ) its faculty, staff, students and other applicable constituents from data loss and
More informationNorthway Bank. Mobile Deposit Addendum. Addendum to the Online Banking Agreement
Northway Bank Mobile Deposit Addendum Addendum to the Online Banking Agreement This Mobile Deposit Addendum (the Addendum ) to the Northway Bank Online Banking Agreement (the Agreement ) contains the terms
More informationBusting Fraud Rings with. Social Link Analysis
Busting Fraud Rings with Social Link Analysis Table of Contents INTRODUCTION... 1 WHAT IS BUST-OUT FRAUD AND WHY IS IT SO HARD TO DETECT?... 2 SOCIAL LINK ANALYSIS (SLA): A POWERFUL NEW WEAPON... 3 HOW
More information2017 AFP. Payments Fraud and Control Survey. Underwritten by REPORT OF SURVEY RESULTS
2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS Underwritten by 2017 AFP Payments Fraud and Control Survey REPORT OF SURVEY RESULTS March 2017 Underwritten by Association for Financial
More informationWhy your PSP should be your best defence against fraud
Why your PSP should be your best defence against fraud July 2017 processing.paysafe.com Why your PSP should be your best defence against fraud If recent crime statistics have taught us anything, it s that
More informationHow to combat card fraud. A guide to detecting and preventing card fraud
How to combat card fraud A guide to detecting and preventing card fraud Contents Introduction 3 Card Present fraud 4 Card Not Present fraud 6 Payment card industry data security standards Your guide to
More informationPaper Check Service Terms and Conditions
Paper Check Service Terms and Conditions This document sets forth the terms and conditions ( Terms and Conditions ) for use of the Paper Check service ( Service ) offered to you ( you ) by Green Dot Bank
More informationTestimony of. Check Clearing for the 21st Century Act. before the. Subcommittee on Financial Institutions and Consumer Credit.
Testimony of America's Community Bankers American Bankers Association Consumer Bankers Association The Financial Services Roundtable Independent Community Bankers of America on Check Clearing for the 21st
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer
More informationState of Card Fraud: 2018
State of Card Fraud: 2018 A deep dive into the evolution of card fraud + industry benchmark data for financial institutions. Stopping Fraud at the Speed of Data Continuing the trend of prior years, the
More information716 West Ave Austin, TX USA
GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is?... 1 Credit Versus Non-Credit Losses... 1 Learning Objectives... 2 Video Supplements...
More informationC a t a l y s t C o r p o r a t e F e d e r a l C r e d i t U n i o n SHARE DRAFT PROGRAM. Prepared by
C a t a l y s t C o r p o r a t e F e d e r a l C r e d i t U n i o n SHARE DRAFT PROGRAM Prepared by Catalyst Corporate Federal Credit Union (800)442-5763 SHARE DRAFT PROGRAM TABLE OF CONTENTS Introduction
More informationCyber Risks & Insurance
Cyber Risks & Insurance Bob Klobe Asst. Vice President & Cyber Security Subject Matter Expert Chubb Specialty Insurance Legal Disclaimer The views, information and content expressed herein are those of
More informationNETEXPRESS ONLINE BANKING AGREEMENT (BUSINESS) Five Star Bank
NETEXPRESS ONLINE BANKING AGREEMENT (BUSINESS) Five Star Bank 1. Meaning of some words. In this agreement: a. We, us, our and ours mean Five Star Bank, 220 Liberty Street, P.O. Box 227, Warsaw, NY 14569;
More informationBank Secrecy Act OFAC FinCEN
Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence
More informationORGANIZATIONAL MANUAL
I. PURPOSE ORGANIZATIONAL MANUAL IDENTITY THEFT PROTECTION A. To establish an Identity Theft Prevention Program designed to detect, prevent and mitigate Identity Theft in connection with the opening of
More informationIdentity Theft Prevention Program Procedure
Identity Theft Prevention Program Procedure Procedure Number 9.6P Effective Date 6/16/2010 1.0 PURPOSE The college shall operate an Identity Theft Prevention Program (Appendix A) according to the written
More informationWHITE PAPER. The Evolution of Fraud in the Insurance Industry
WHITE PAPER The Evolution of Fraud in the Insurance Industry Introduction The insurance industry is certainly no stranger to online fraud, whether it s being directed at insurers or the consumers they
More informationIdentity Fraud Endorsement
220 Commercial Street P.O. Box 10 Berwick, NS B0P 1E0 www.kingsmutual.ns.ca TF: 1.800.565.7220 EO-0870-0612 Identity Fraud Endorsement Insuring Agreement If the Declaration Page shows that the Identity
More informationNote: Action items are italicized
BEREA COLLEGE Red Flag Rules/ Identity Theft Prevention Policy Document No. FIN002 Effective Date 05/2009 Revision Date Pages 1-7 Approval: On File in F/A Note: Action items are italicized 1.0 Background
More informationDriven. FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 L50
Driven NADA Management series L50 A Dealer Guide to THE FTC Red Flags and Address Discrepancy Rules: Protecting Against Identity Theft L50 The National Automobile Dealers Association (NADA) has prepared
More informationEXHIBIT A IDENTITY THEFT PREVENTION PROGRAM
EXHIBIT A IDENTITY THEFT PREVENTION PROGRAM I. ADOPTION Michigan State University Identity Theft Prevention Program The Board of Trustees of Michigan State University adopted this Identity Theft Prevention
More informationCity National Bank & Trust Mobile Check Deposit Agreement
City National Bank & Trust Mobile Check Deposit Agreement This City National Bank & Trust Mobile Check Deposit Agreement ( Mobile Check Deposit Agreement or mrdc Agreement ) sets forth the terms and conditions
More informationAnti-Fraud Policy. Version: 8.0 Approval Status: Approved. Document Owner: Graham Feek. Review Date: 07/12/2018
Anti-Fraud Policy Version: 8.0 Approval Status: Approved Document Owner: Graham Feek Classification: External Review Date: 07/12/2018 Last Reviewed: 09/12/2016 Table of Contents 1. Policy Statement...
More informationO P C S. OPCS Overview 9/28/2017 (OPCS) The implementation of the Ohio Pooled Collateral System creates a unique partnership between:
O P C S (OPCS) opcs.ohio.gov 1 OPCS Overview The implementation of the Ohio Pooled Collateral System creates a unique partnership between: Treasurer s Office Financial Institutions Local Governments opcs.ohio.gov
More informationFRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)
TABLE OF CONTENTS SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES OCCUPATIONAL FRAUDS ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 FINANCIAL STATEMENT FRAUD What Is Financial
More informationFinancial Crime: Awareness & Prevention. Jon Jarosinski
Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit
More informationFitchburg State College Identity Theft Prevention Program updated 11/17/09
Fitchburg State College Identity Theft Prevention Program updated 11/17/09 Program Adoption Purpose Definitions Fitchburg State College (College) developed this Identity Theft Prevention Program to detect,
More informationPAI Secure Program Guide
PAI Secure Program Guide A complete guide to understanding the Payment Card Industry Data Security Requirements (PCI DSS) and utilizing the PAI Secure Program Welcome to PAI Secure, a unique 4-step PCI-DSS
More informationFRAUD EXAMINERS MANUAL
TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)...
More informationAsset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE
Asset Misappropriation Peter N. Munachewa, CICA, CFIP, CFE CORPORATE FRAUD AND ABUSE CLASSIFICATION SYSTEM Corruption Asset Misappropriation Fraudulent Statements Conflicts of Interest Purchasing Schemes
More informationClarion University Identity Theft Prevention Program
Clarion University Identity Theft Prevention Program A) Purpose The purpose of the Identity Theft Prevention Program (Program) is to detect, prevent and mitigate identity theft in connection with any covered
More informationSubject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New
Subject: Identity Theft, G-113 Department: All & Branches References: Part 717, NCUA Rules and Regs, FACT Act, Companion SOP s G-30 (Opening New Accounts), G-38 (E-Commerce), G-40 (Issuance of Visa Cards),
More informationEXECUTIVE SUMMARY. A systematic approach for combating enrollment fraud
EXECUTIVE SUMMARY A systematic approach for combating enrollment fraud OCTOBER 2017 Enrollment fraud is a serious and growing problem The proliferation of identity fraud and new ways of enrolling in health
More informationROCHESTER INSTITUTE OF TECHNOLOGY
ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3
More informationNEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES
NEW YORK STATE DEPARTMENT OF FINANCIAL SERVICES PROPOSED 23 NYCRR 500 CYBERSECURITY REQUIREMENTS FOR FINANCIAL SERVICES COMPANIES I, Maria T. Vullo, Superintendent of Financial Services, pursuant to the
More informationEastpointe Community Credit Union Identity Theft and Deterrence Policy
Eastpointe Community Credit Union Identity Theft and Deterrence Policy Areas of Responsibility: Management/Operations Board Approval December 14, 2016 Board Review: December 14, 2016 Last Revision: December
More informationFrequently Asked Questions
Frequently Asked Questions How do you monitor my identity? We use our exclusive software to proactively monitor various sources for suspicious activity. With PrivacyArmor : You will be able to set thresholds
More informationPRIVACY AND CYBER SECURITY
PRIVACY AND CYBER SECURITY Presented by: Joe Marra, Senior Account Executive/Producer Stoya Corcoran, Assistant Vice President Presented to: CIFFA Members September 20, 2017 1 Disclaimer The information
More informationGood From The Inside Out. Saturday, April 8, 2017
Good From The Inside Out Saturday, April 8, 2017 What s New? Just last week Ex-CFO Accused of Embezzling $20M From Credit Union -Detroit Free Press January 9, 2016 Headlines Recent headlines Engaged CU
More informationThe Interagency Guidelines on Identity Theft Detection, Prevention and. Mitigation, commonly referred to as the Red Flag Rules, require each financial
DEVELOPING YOUR DEALERSHIP S WRITTEN PROGRAM TO DETECT, PREVENT, AND MITIGATE IDENTITY THEFT AS REQUIRED BY THE THE RED FLAG RULES AND TO RESPOND TO NOTICES OF ADDRESS DISCREPANCIES The Interagency Guidelines
More informationNATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE
NATIONAL RECOVERY AGENCY COMPLIANCE INFORMATION GRAMM-LEACH-BLILEY SAFEGUARD RULE As many of you know, Gramm-Leach-Bliley requires "financial institutions" to establish and implement a Safeguard Rule Compliance
More informationMobile Check Deposit
Champlain National Bank what is mobile check deposit? Mobile Check Deposit allows you to deposit checks directly into a Champlain National Bank checking, savings, or money market account by simply taking
More informationBank Secrecy Act and OFAC Compliance Board of Directors Training
Bank Secrecy Act and OFAC Compliance Board of Directors Training Introduction Today s presenters: Karen M. Janota Assurance Manager Disclaimer: The contents of this presentation are intended to provide
More informationVisa Merchant Best Practice Guide for Cardholder Not Present Transactions
Visa Merchant Best Practice Guide for Cardholder Not Present Transactions Table of Contents Section 1 About This Guide 03 Section 2 Merchant Procedures 05 Section 3 Authorisation 07 Authorisation Procedures
More informationVisa Debit Conditions of Use
Visa Debit Conditions of Use BEFORE YOU USE YOUR VISA CARD Please read these Conditions of Use. They apply to: all transactions initiated by you through an Electronic Banking Terminal (which in these Conditions
More informationBusiness Merchant Capture Agreement. A. General Terms and Conditions
Business Merchant Capture Agreement A. General Terms and Conditions Merchant Capture (MC), the Service, allows you to deposit checks to your LGE Business Account from remote locations by electronically
More informationIdentity thieves use a variety of ways to gain access to your personal information:
How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into
More informationPolicy Statement. Definitions -Covered Account -Identifying Information -Identity Theft -Red Flag
Page 1 Austin Peay State University Identity Theft Prevention POLICIES Issued: March 25, 2017 Responsible Official: Vice President for Finance and Administration Responsible Office: Information Technology
More informationData Thefts and Protecting Client Tax Information
Data Thefts and Protecting Client Tax Information October 20, 2015 The information contained in this presentation is current as of the date it was presented. It should not be considered official guidance.
More informationTips for Preventing Credit Card Fraud and Avoiding Chargebacks
Tips for Preventing Credit Card Fraud and Avoiding Chargebacks Accepting credit cards is more than just a courtesy that your small business extends to its valued customers. In today s marketplace, it has
More informationCHARGEBACK GUIDE.
CHARGEBACK GUIDE www.globalpaymentsinc.co.uk 02 03 This step by step guide is designed to help you if you ever receive a chargeback whilst taking card payments with us. You will also find out about some
More informationProtecting against and recovering from fraud and identity theft WHAT TO DO
Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls
More information