CONTROLLING FRAUD IN THE FINANCIAL SERVICES SECTOR. Aub Chapman Chief Manager Operational Control, Westpac Banking Corporation

Size: px
Start display at page:

Download "CONTROLLING FRAUD IN THE FINANCIAL SERVICES SECTOR. Aub Chapman Chief Manager Operational Control, Westpac Banking Corporation"

Transcription

1 CONTROLLING FRAUD IN THE FINANCIAL SERVICES SECTOR Aub Chapman Chief Manager Operational Control, Westpac Banking Corporation Paper presented at the Fraud Prevention and Control Conference convened by the Australian Institute of Criminology in association with the Commonwealth Attorney-General s Department and held in Surfers Paradise, August 2000

2 Introduction Fraud can be described as deceit or trickery deliberately practiced in order to gain some advantage dishonestly. If we were to describe fraud as an industry, it would clearly be one of the growth areas in the economy. It is also one of the least understood areas of the economy and, because it is often viewed as a victimless crime, it does not draw community reaction like other crimes. At this point in time there does not appear to be any coordinated political focus on measures that will address the very serious losses resulting from fraud. One hardened criminal who has served several periods of imprisonment for armed hold-up offences was reported to have recently expressed an opinion to senior police that he wished he had understood how easy it was to commit fraud earlier in his criminal life. He now considers that fraud involves less trauma, the rewards are far greater and the penalties substantially less than in other forms of crime. Unfortunately, the quantum of fraud being attempted is not readily identified. Different industry sectors and institutions within sectors have traditionally categorised financial losses under a number of headings to suit internal management reporting and this has hindered the establishment of aggregated figures which would assist in identifying the magnitude and types of fraud losses. Changes in business practices have occurred without revision of loss categorisation and this has also impeded the identification of losses incurred as a result of fraud. As an example, within the financial services sector, it is only in the last two to three years that institutions have come to recognise the need to more thoroughly examine loan write-offs to identify those which clearly are fraud based losses as opposed to genuine lending losses. There is little doubt that the financial services sector is one of the fastest changing areas in the community. The combination of industry deregulation and the exploitation of new and emerging technologies is resulting in financial institutions having the ability to deliver a vast array of products and services utilising an increasing number of delivery channels. The benefits and flexibility now being provided to customers is unfortunately also being exploited by those seeking to gain an advantage through dishonest behaviour. New opportunities for fraud are emerging almost daily. The decision to engage in any business function is usually based on a cost/benefit equation which aligns with the relevant enterprise s business objectives and appetite for risk. The business of controlling fraud risk is no different in that the assessment will include a number of known factors and a number of unknown elements. However, in order to manage fraud risk, we must be able to track and understand it. The competitive demand for fast to market product development introduces a major challenge in creating cost-effective and efficient controls which do not impede the need for flexibility in product features and delivery mechanisms. This challenge will only increase with the introduction of new and emerging technologies. Types of Fraud Within Financial Services A. Transaction Fraud While it is necessary to try and predict the fraud risks associated with the future direction of business practices, it is also important to recognise that the more traditional financial services products remain a major area of fraud risk. At the BAI Check Fraud Conference held in the US in November 1999, it was reported that Check Fraud in the United States was growing at 17% per 2

3 annum. My research within the Australian financial services sector indicates that the exposure to loss from paper based fraud has also grown substantially on a 1998 / 1999 comparison. Negotiation of valueless cheques, stolen cheques, forged cheques, altered cheques and counterfeit cheques remain fertile ground for those attempting to commit fraud. It is obvious that in a number of instances, the scams are well organised and involve a number of parties. Theft of cheques in the mail system, the use of scanners, colour photocopies and chemicals to alter existing or even create false documents clearly demonstrate a growing trend away from single opportunists to more deliberate wide-spread attacks on the financial services industry. The introduction of credit and debit cards which can be used in an ever increasing marketplace has facilitated new forms of fraud. Lost and stolen cards, lost / misused Personal Identification Numbers (PIN s) and corrupt Card Merchants have provided fraudsters with new channels through which to conduct attacks on financial institutions. Turnover in the workforce of financial institutions has added to community knowledge of financial systems and the inherent weaknesses in some products and services which are on offer. The ATM off-host facility provided by financial institutions as a means of continuous service to customers has been and continues to be exploited by those seeking to defraud financial institutions. The skimming of account and personal information contained in the magnetic strip on the back of a credit card has been made relatively easy by modern cheap technology. This leads to a lucrative market in duplicate/counterfeit cards. The use of facsimile machines by clients to transmit instructions to financial institutions is another area where fraud losses are occurring. High quality desktop publishing outputs are now widely available through the use of personal computers and laser printers. The ability to produce near perfect copies of legitimate business documents, many containing company signatures which have been scanned from annual reports or other official papers, is relatively easy. Such documents can be forwarded by facsimile to a financial institution instructing that funds be remitted, usually offshore via some irrevocable channel such as the SWIFT system. Over recent years, there have been a number of cases involving organised scams using this simple technique resulting in substantial losses for financial institutions. The imperative to compete in a fast changing market has placed strains on financial institutions to limit time-consuming validation and verification checks. This pressure has presented new opportunities for those seeking to benefit through fraud at the transactional level. B. Identity Fraud Stolen and False Identity Over recent years a more serious area of fraud has started to come into prominence. This is the area of identity fraud. Mobility within the community means that business no longer relies on local knowledge as to who it deals with. A customer/ business relationship is usually commenced by the prospective customer presenting documents by which his or her identity is established. Through the theft of documents, it is possible for one person to assume the identity of another and where reasonable similarity is present (eg same gender, similar age, etc) it is not difficult to undertake business dealings in the other person s name. The use of good quality and cheap technology facilitates the creation of documents which do not represent a real person. When these techniques are used to create a document or to falsify an original document, it becomes somewhat easy for a person to use that document to procure other documents and thereby create a new, yet false identity. 3

4 Under British and Australian law, the use of a false or alternate identity is not necessarily illegal and the use of an alias is common in entertainment and literary circles. Many women choose to use both their maiden and married names. The advent of the Cash Transaction Reports Act in 1988 (subsequently changed to the Financial Transaction Report Act) introduced a requirement for cash dealers (which includes many of the major financial institutions) to identify all signatories to accounts and made it an offence to open or operate an account in a false name. To support this regime, a process was established whereby numeric values are assigned to a defined group of documents, albeit none of them are officially considered to be forms of identification in their own right. The 100 point system, as it is known, provides for cash dealers to accept a combination of these documents as evidence of a person s identity unless there are obvious discrepancies. The use of modern technology to falsify documents, which to the average person appear to be genuine, has exposed a major flaw in the underlying veracity of the documents acceptable under the 100 point scheme. There has been a disturbing trend in identity fraud and financial institutions are now seeking to more accurately quantify losses from this particular type of fraud. The future poses even greater risk of loss through fraud. The explosion in remote delivery channels such a telephone banking and on-line banking means that face to face contact between financial institutions and their customers is becoming less frequent and in some cases may never exist. The use of intermediaries such as financial brokers, loan introducers, third party agents and outsourcing initiatives present new challenges in controlling fraud. The impact of the Internet on the conduct of commerce involving financial transactions is not well understood. Questions surrounding sovereign and judicial borders, powers to undertake transborder investigations and the ability to successfully mount prosecutions for fraud have yet to be answered. Existing and Potential Fraud Controls What Financial Institutions are Doing Having outlined the growing problem that fraud presents to financial institutions, it is important to examine what has been done, what is being done and what needs to be done if financial institutions are to contain fraud losses. I will address this under three headings within the individual financial institution, within the industry and finally the need for cooperation between the financial services sector, law enforcement agencies and government. A. Controls Within the Financial Institution Within the individual financial institution, there needs to be a model or framework which defines the fraud control functions in a way which ensures that all risks are covered. This framework must align with the institution s appetite for risk and because of the diverse nature of the larger financial services groups it will not necessarily be consistent across all products, services, systems or delivery channels. An obvious starting point is to group the fraud control functions into three categories. I would suggest that the first is prevention and detection, the second addresses investigations and the third should cover case management and recovery as well as the embedding of all learning into new products and services. 4

5 Preventative functions should include fraud training and awareness programs, fraud risk assessment on all new products and processes, automated fraud detection systems and a policy which mandates embedded fraud prevention controls in all products and systems. Unfortunately, traditional methods have been reactive relying on manual and inefficient controls at touchpoints to identify fraud. Within Westpac, we have recognised that this approach is no longer viable nor supportive of the group s business drivers. Our fraud prevention and detection toolkit is now heavily weighted in favour of embedded controls supported by an increasing array of automated analysis tools which identify and report fraud attempts in a timely manner. We are utilising a mix of in-house developed programs and vendor supplied packages which interrogate transactions in either an online/realtime mode or by overnight batch processing dependent upon the risk profile of the product or process. The payback on this investment has been quite remarkable with the gap continuing to widen between fraud identified and prevented and the actual losses being experienced. This gap is being influenced by both factors an increase in fraud detected and prevented and in a reduction in actual fraud losses. However, we are not resting on our laurels, the challenge will continue while ever our business responds to customer demand for more sophistication and flexibility in products and services. Just as the credit processes within financial institutions were advanced through the introduction of automated credit scoring, so too will fraud controls benefit from software which identifies transactions with a high probability of fraud. Packages such as Fraud Detect and Hunter are good examples. To manage the investigations workload, we have installed a case management tool known as ASIS and this is proving to be valuable in monitoring progress and linking cases. We will shortly be installing the I2 software package which will also assist in establishing fraud patterns. Funding for fraud control initiatives continues to compete with other business initiatives and is not always easy to justify on a cost/benefit basis. Within Westpac, we have revised our fraud control management information reporting to no longer simply report on actual losses but to now also focus on the level of fraud identified and prevented. This approach has enabled us to quantify the value-add being achieved by our investments in skilled resources and automated tools. B. Industry Interaction There have been a number of attempts to achieve uniformity in the categorisation of fraud within the financial services sector. Over recent years, the Australian Bankers Association Fraud Working Group has been successful in addressing a number of issues common to all members. However, attempts at sharing actual fraud data have proven very difficult with various obstacles being raised. Confidentiality of corporate data and privacy of customer information have often been proffered as reasons for declining to submit information which could be aggregated at industry level. These barriers have broken down over the past two to three years and there is now a commonly held view that fraud is not a competitive issue and industry-wide initiatives are required to support the internal controls and processes employed within individual institutions. One of the most urgent needs is the creation of a national fraud database into which financial institutions can input existing fraud data and against which new data can be tested to identify fraud attempts. This can be achieved through the matching new data with data known to be 5

6 fraudulent or where the transaction elements suggest a high probability of fraud. Outputs from such a database can place the inquiring institution on notice that further investigation may be prudent before proceeding with the transaction. The Australian Bankers Association established a national fraud database research project with a number of commercial packages being evaluated and the impacts of the proposed extension of the Privacy Act to cover the private sector were taken into consideration. As yet no financial industry-wide fraud database has been established. The National Hunter product from Experian and the FraudCheck product from Data Advantage are two packages currently under consideration or trial by various financial institutions seeking to assess the value-add that industry level data comparison provides beyond internal checking. We are aware that the Australian Bureau of Criminal Intelligence has established a national fraud database for use by Federal, State and Territory police services. I consider that, in the fullness of time, there would be substantial community benefits arising from some form of data sharing between the law enforcement national fraud database and the yet to emerge financial services national fraud database. Under the auspices of the Olympic Security Command Centre, an industry-wide group known as the Australian Credit Card Industry Fraud Forum was established to examine the potential fraud risks which may emerge at the time of the Olympic Games. This group comprises banks, credit card scheme providers and law enforcement personnel and has developed and delivered fraud training materials to retailers, financial institutions and law enforcement agencies. Agreement has been reached on the monitoring and reporting of fraud during the period just prior to, during and immediately after the games. An industry-wide fraud alert process has been established as a means of mitigating any fraud scams which are identified. There is general consensus that the establishment of this group has been beneficial and that it should continue beyond the Olympic Games to address other fraud control issues on an industrywide basis. This proposal is to be discussed by the participants at the next meeting in November. C. Co-operation Between Financial Institutions, Law Enforcement Agencies and Government The Australian National Audit Office report into the Australian Taxation Office management of Tax File Numbers has highlighted the pervasive nature of fraud within the community. Benefits fraud remains a major concern to Centrelink and many of the elements are common with the types of fraud being experienced by financial institutions. In New South Wales, a pilot program between the Registry of Births Deaths and Marriages and Westpac and a concurrent pilot between the Registry and the Roads and Traffic Authority identified a number of false birth certificates that had been presented as part of the identification process. The New South Wales Attorney General subsequently announced the formalisation of this verification process and it is now under active investigation for extension to other States and Territories. A national scheme linking State and Territory drivers licence databases is also underway. As one outcome from the last Australian Crime Commissioners Conference, the Major Fraud Group of the Victorian Police has progressed the Challenge Response project which is an Australia-wide approach to identification issues. As part of this project, a Financial 6

7 Institutions Group Consultative Committee has been convened to bring together a range of initiatives including those I referred to earlier. A pilot program involving Vic Roads and the ANZ Bank will examine the level of fraud in Victorian licences presented as part of identification process. As I alluded to earlier, such verification processes would help address the key flaw underlying the 100 point system required under the Financial Transaction Reports Act. In submissions before the House of Representatives Standing Committee on Economics, Finance and Public Administration during its Review of the Australian Taxation Office Management of Tax File Numbers, the ABA and Westpac representatives proposed a scheme whereby financial institutions could utilise a single independent conduit to coordinate data transfers between individual financial institutions and specific government authorities for verifying the authenticity of key documents presented for identification purposes when establishing accounts. Such a scheme would preserve customer privacy, reduce fraud and provide the relevant authorities with an ongoing quality assurance process regarding the level of fraudulent documents in the community. The suggested scope of this scheme covers birth certificates, drivers licences and passports. In closing, I would like to introduce one further matter for consideration. In the current environment, financial institutions carry an unacceptable proportion of losses resulting from fraud. There is a critical need to redress this position with responsibility being shifted to the party in the best position to prevent fraud occurring. In the United States of America, the introduction of the Uniform Commercial Code has produced a more balanced outcome with the concepts of Contributory Negligence and Comparative Negligence now influencing court findings. We would do well to seriously consider a similar regime for Australia. 7

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION

More information

Payment Fraud Statistics

Payment Fraud Statistics Instrument No. of Fraud Payment Fraud Statistics - Summary of Results Fraud Perpetrated on Australian Issued Payment Instruments (Revised December 2013) Value ($) of Fraud Total No. of all (thousands)

More information

BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)]

BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)] BILL C-27 [An Act to amend the Criminal Code (identity theft and related misconduct)] CBA Submission to the House of Commons Standing Committee on Justice and Human Rights April 7, 2008 Introduction The

More information

Helping to Reduce Insurance Fraud when Customers Apply for Products. A Good Practice Guide

Helping to Reduce Insurance Fraud when Customers Apply for Products. A Good Practice Guide Helping to Reduce Insurance Fraud when Customers Apply for Products A Good Practice Guide October 2011 1 Foreword Insurance is a unique form of contracting based on mutual trust between insurers and customers.

More information

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009 Current Laws: A person commits the crime of identity theft if

More information

Driving License. National Insurance Number

Driving License. National Insurance Number STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of

More information

Appendix A DRAFT INFORMATION MANAGEMENT PLAN

Appendix A DRAFT INFORMATION MANAGEMENT PLAN 1 Appendix A DRAFT INFORMATION MANAGEMENT PLAN Pacific Region Identity Protection Project PRIPP April 2004 Forum Eyes Only 2 ABBREVIATIONS Throughout this report the following abbreviations will be utilised:

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES

FLIP IDENTITY THEFT. (Financial Literacy in Practice) February 2015 OVERVIEW TEACHER NOTES TEACHER NOTES FLIP (Financial Literacy in Practice) February 2015 IDENTITY THEFT OVERVIEW This resource complements the material in Operation Financial Literacy. It has been written to address current issues which specifically

More information

Deception scams drive increase in financial fraud

Deception scams drive increase in financial fraud ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud

More information

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009

MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 MARYLAND IDENTITY THEFT RANKING BY STATE: Rank 10, 85.8 Complaints Per 100,000 Population, 4821 Complaints (2007) Updated January 29, 2009 Current Laws: A person may not knowingly, willfully, and with

More information

FAQs Organised Crime and Anti-corruption Legislation Bill

FAQs Organised Crime and Anti-corruption Legislation Bill FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity

More information

Report to the Council of Australian Governments. A Review of the National Identity Security Strategy

Report to the Council of Australian Governments. A Review of the National Identity Security Strategy Report to the Council of Australian Governments A Review of the National Identity Security Strategy 2012 Report to COAG - Review of the National Identity Security Strategy 2012 P a g e i Table of contents

More information

Investigations Support

Investigations Support Investigations Support for Fraud and Financial Crimes This document explains how CIFAS information can: support your investigations into any crime type - not just fraud disrupt Organised Criminal Groups

More information

BNZ Advantage Credit Card Terms and Conditions.

BNZ Advantage Credit Card Terms and Conditions. BNZ Advantage Credit Card Terms and Conditions. 1 May 2015 This document contains the terms and conditions that apply to BNZ Advantage credit card accounts operated by you, including the terms and conditions

More information

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008

MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 MISSISSIPPI IDENTITY THEFT RANKING BY STATE: Rank 32, 57.3 Complaints Per 100,000 Population, 1673 Complaints (2007) Updated December 21, 2008 Current Laws: A person shall not obtain or attempt to obtain

More information

Joint Media Release. Payments Technology

Joint Media Release. Payments Technology Joint Media Release Payments Technology Sydney, 13 October, 2006: The Australian Bankers Association (ABA) and Australian Payments Clearing Association (APCA) are releasing today the joint letter that

More information

PayPoint.net Gateway Guide to Identifying Fraud Risks

PayPoint.net Gateway Guide to Identifying Fraud Risks PayPoint.net Gateway Guide to Identifying Fraud Risks Copyright PayPoint.net 2010 This document contains the proprietary information of PayPoint.net and may not be reproduced in any form or disclosed to

More information

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

INTRODUCTION. Identity Theft Crime Victim Assistance Kit Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change

More information

Helping you to protect yourself against fraud and financial crime

Helping you to protect yourself against fraud and financial crime Helping you to protect yourself against fraud and financial crime first direct takes fraud & other financial crimes very seriously. Even though we have market-leading fraud detection systems, we want you

More information

Lake County Sheriff s Office Identity Theft/Fraud Packet

Lake County Sheriff s Office Identity Theft/Fraud Packet Gary S. Borders, Sheriff Lake County Sheriff s Office Identity Theft/Fraud Packet Information and Instructions The Information and Instructions portion of this packet is for you to keep and contains information

More information

Protecting your business from some of the current fraud threats

Protecting your business from some of the current fraud threats Protecting your business from some of the current fraud threats This literature provides guidance on fraud prevention and is provided for information purposes only. Where noted the guidance provided has

More information

General Terms and Conditions

General Terms and Conditions Effective 20 July 2015 What you need to know about these terms and conditions This booklet sets out the terms and conditions that apply to the accounts, products, or services we provide. It includes information

More information

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft

Protect Your Personal Information. Tips and tools to help safeguard you against identity theft Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY

More information

COMMUNICATING ELECTRONICALLY WITH CUSTOMS

COMMUNICATING ELECTRONICALLY WITH CUSTOMS COMMUNICATING ELECTRONICALLY WITH CUSTOMS This fact sheet deals with communicating electronically with Customs via the Integrated Cargo System (ICS). The main elements covered by this fact sheet are: communication

More information

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09

IDENTITY THEFT WHAT YOU NEED TO KNOW. Created by GL 04/09 IDENTITY THEFT WHAT YOU NEED TO KNOW Created by GL 04/09 Table of Contents 1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

SPG 223 Fraud Risk Management. June 2015

SPG 223 Fraud Risk Management. June 2015 SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation

More information

POLICE CHECKS GUIDANCE NOTE

POLICE CHECKS GUIDANCE NOTE POLICE CHECKS GUIDANCE NOTE Index Purpose Obligations and risks Information about national police checks Recruiting new staff Checking current employees Finding out more Purpose When recruiting someone

More information

Civil Justice Council response to Insurance Task Force interim report. May 2015

Civil Justice Council response to Insurance Task Force interim report. May 2015 Civil Justice Council response to Insurance Task Force interim report May 2015 The CJC welcomes an initiative to combat insurance fraud, which is not always easy to detect, but is a crime, and does lead

More information

Risks and responses to fraud in Australia. Dr Russell G Smith Principal Criminologist

Risks and responses to fraud in Australia. Dr Russell G Smith Principal Criminologist Risks and responses to fraud in Australia Dr Russell G Smith Principal Criminologist Outline The current fraud risk environment Drivers of change in the 21 st century The effects of the global financial

More information

WHY YOUR CREDIT HISTORY MATTERS AND HOW TO IMPROVE IT.

WHY YOUR CREDIT HISTORY MATTERS AND HOW TO IMPROVE IT. WHY YOUR CREDIT HISTORY MATTERS AND HOW TO IMPROVE IT. CONTENTS. 1 WHY YOUR CREDIT HISTORY MATTERS 1 2 WHAT S CREDIT? 2 3 WHAT IS A CREDIT REPORT? 3 4 CHECKING YOUR CREDIT REPORT 4 5 IMPROVING YOUR CREDIT

More information

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS

Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS Public Advisory: Special Report on COUNTERFEIT CHECKS AND MONEY ORDERS Summary In recent years, law enforcement and regulatory authorities in Canada and the United States have seen a substantial increase

More information

Australian Government

Australian Government Australian Government Australian Transaction Reports and Analysis Centre Integration techniques Objectives Integration is the third stage of the money laundering process, in which the illegal funds or

More information

credit card Conditions of Use

credit card Conditions of Use VISA credit card Conditions of Use EFFECTIVE FROM 20 MARCH 2013 a refreshing attitude to banking QUEENSLAND COUNTRY CREDIT UNION VISA CREDIT CARD 1 Contents 1. Introduction 3 2. Additional Cards 3 3. Application

More information

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally

More information

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud

A CHASE PAYMENTECH WHITE PAPER. Expanding internationally: Strategies to combat online fraud A CHASE PAYMENTECH WHITE PAPER Expanding internationally: Strategies to combat online fraud Fraud impacts nearly eight in every ten international online retailers 1. It hampers prospects for growth, restricts

More information

one admin. one tool. Providing instant access to hundreds of industry leading verification tools.

one admin. one tool. Providing instant access to hundreds of industry leading verification tools. 2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74

More information

Cloud Computing in a Government Context

Cloud Computing in a Government Context Cloud Computing in a Government Context Introduction There has been a lot of hype around cloud computing to the point where, according to Gartner, 1 it has become 'deafening'. However, it is important

More information

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html

http://www.ftc.gov/bcp/edu/microsites/idtheft/index.html Identity Theft: Steps to Take if You are a Victim We understand the stress, time and effort required as a result of having your identity stolen and used fraudulently. While there are many resources available

More information

ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N

ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N ID Theft P E R S O N A L A N D O R G A N I Z AT I O N A L P R E V E N T I O N A N D D E T E C T I O N M i c h e l l e C u m m i n g s, C I A, C F E, C D F M According to the National Crime Victimization

More information

COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY

COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY December 2014 1 Contents Section Page Council Tax Reduction, Discount & Exemption Anti-Fraud Policy 1 Introduction 3 2 Definition of Council

More information

ATO Submission Inquiry into penalties for white collar crime

ATO Submission Inquiry into penalties for white collar crime ATO Submission Inquiry into penalties for white collar crime Senate Economics References Committee 1 April 2016 EXTERNAL UNCLASSIFIED Table of Contents Introduction... 3 Executive summary... 3 The scope

More information

Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3

Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3 Standardisation of definitions of identity crime terms: A step towards consistency Report Series No. 145.3 This publication was obtained from www.acpr.gov.au STANDARDISATION OF DEFINITIONS OF IDENTITY

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and

More information

Western Australian Auditor General s Report. Fraud Prevention and Detection in the Public Sector

Western Australian Auditor General s Report. Fraud Prevention and Detection in the Public Sector Western Australian Auditor General s Report Fraud Prevention and Detection in the Public Sector Report 7 June 2013 Vision of the Office of the Auditor General Excellence in auditing for the benefit of

More information

West Palm Beach Police Department s Identity Theft Victim s Packet

West Palm Beach Police Department s Identity Theft Victim s Packet West Palm Beach Police Department s Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted West Palm Beach Police Department and obtained a

More information

ING DIRECT Customer Identification Procedures for Brokers

ING DIRECT Customer Identification Procedures for Brokers ING DIRECT Customer Identification Procedures for Brokers Managing obligations of the Anti-Money Laundering and Counter-Terrorism Financing Act ( AML/CTF Act ) for the purpose of Customer Identification

More information

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited

Security Guide. for electronic transactions. UniBank is a division of Teachers Mutual Bank Limited Security Guide for electronic transactions UniBank is a division of Teachers Mutual Bank Limited Teachers Mutual Bank Limited ABN 30 087 650 459 AFSL/Australian Credit Licence 238981 Who We Are UniBank

More information

Application to register a change of name (adult 18+ years)

Application to register a change of name (adult 18+ years) Application to register a change of name (adult 18+ years) July 2014 Recognising the significance of life events Important information about your change of name application If you require access to a translation

More information

2: Credit cards, etc. Overview of the sector

2: Credit cards, etc. Overview of the sector 19 2: Credit cards, etc Overview of the sector Note: This sectoral guidance is incomplete on its own. It must be read in conjunction with the main guidance set out in Part I of the Guidance. 2.1 A credit

More information

Protective security governance guidelines

Protective security governance guidelines Protective security governance guidelines Business impact levels Approved November 2014 Amended April 2015 Version 2.1 Commonwealth of Australia 2013 All material presented in this publication is provided

More information

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper

Fraudulent accounts in collections: improve detection and reduce collector workload. An Experian briefing paper Fraudulent accounts in collections: improve detection and reduce collector workload An Experian briefing paper September 2010 1. The inter-relationship of fraud and collections The fraud and collections

More information

STUDY: LEGAL REQUIREMENTS FOR AN EXCHANGE OF FRAUD DATA AMONG CARD ISSUERS

STUDY: LEGAL REQUIREMENTS FOR AN EXCHANGE OF FRAUD DATA AMONG CARD ISSUERS 4 STUDY: LEGAL REQUIREMENTS FOR AN EXCHANGE OF FRAUD DATA AMONG CARD ISSUERS In 2003, the Observatory looked at the automatic fraud detection systems implemented by card issuers. This work showed that

More information

York County Sheriff's Office Identity Theft Victim s Packet

York County Sheriff's Office Identity Theft Victim s Packet York County Sheriff's Office Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have received a copy of your police report from the York County Sheriff's

More information

Recovering Your Identity. Advice for victims of identity crime

Recovering Your Identity. Advice for victims of identity crime Recovering Your Identity Advice for victims of identity crime How will you know your identity has been stolen? Identity crime is unfortunately very common. Around 1 in 5 Australians have been a victim

More information

CHECK FRAUD. Federal Reserve System

CHECK FRAUD. Federal Reserve System CHECK FRAUD Federal Reserve System Check fraud affects every financial institution, every business, and every individual throughout the United States and around the world. Industry sources estimate that

More information

BT Quick Starts for Retail Banking Customers

BT Quick Starts for Retail Banking Customers BT Quick Starts for Retail Banking Customers An overview of BT s Quick Start services The retail banking industry continues to be heavily influenced by national and international issues including tax regimes,

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Privacy and Information Protection Bulletin

Privacy and Information Protection Bulletin Privacy and Information Protection Bulletin March 2005 Fasken Martineau DuMoulin LLP Identity Theft Sara Levine and Joanna Erdman (student-at-law), Toronto Vancouver Calgary Toronto Montréal Québec City

More information

Commonwealth Organised Crime Strategic Framework: Overview

Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview Commonwealth Organised Crime Strategic Framework: Overview ISBN: 978-1-921241-94-9 Commonwealth of Australia 2009 This work is copyright. Apart

More information

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet

Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Avondale Police Department Identity Theft / Fraud / Forgery Victim's Packet Information and Instructions This packet should be completed once you have contacted the Avondale Police Department and obtained

More information

Investigation and Prosecution of Identity Theft

Investigation and Prosecution of Identity Theft Investigation and Prosecution of Identity Theft In an effort to assist you in dealing with problems related to Identity Theft, the Menomonee Falls Police Department has prepared this packet of information

More information

IDENTITY THEFT VICTIM S PACKET

IDENTITY THEFT VICTIM S PACKET DEPARTMENT OF PUBLIC SAFETY 1150 Canton Center S Canton, MI 48188-1699 John R. Santomauro, Director of Public Safety IDENTITY THEFT VICTIM S PACKET INFORMATION AND INSTRUCTIONS The purpose of this packet

More information

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT

CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT CITY OF ROCHESTER, MINNESOTA POLICE DEPARTMENT 101 4 TH Street Southeast Rochester, Minnesota 55904-3761 507-328-6800 Fax 507-328-6975 To: From: Subject: Identity Theft and Internet Crime Victims Rochester

More information

Identity Theft Assistance: Information for Recovering Your Good Name

Identity Theft Assistance: Information for Recovering Your Good Name Identity Theft Assistance: Information for Recovering Your Good Name I Could Be A Victim of Identity Theft! What Do I Do Next? We understand that you may have been a victim of identity theft. Enclosed

More information

Identity Related Crime A Rapidly Growing Problem

Identity Related Crime A Rapidly Growing Problem Identity Related Crime A Rapidly Growing Problem But he that filches from me my good name/ Robs me of that which not enriches him/ And makes me poor indeed." Shakespeare, Othello, act iii. Sc. 3. By Shane

More information

Identity Theft. What it is and How to Protect Yourself

Identity Theft. What it is and How to Protect Yourself Mark R. Herring Attorney General Commonwealth of Virginia Office of the Attorney General 900 East Main Street Richmond, Virginia 23219 (804) 786-2071 (Telephone) (804) 786-1991 (Facsimile) Identity Theft

More information

Foreign Currency Account & Foreign Currency Term Deposit Terms and Conditions Effective 1 April 2015

Foreign Currency Account & Foreign Currency Term Deposit Terms and Conditions Effective 1 April 2015 Foreign Currency Account & Foreign Currency Term Deposit Terms and Conditions Effective 1 April 2015 What you need to know about these terms and conditions This booklet sets out the terms and conditions

More information

NCUA LETTER TO CREDIT UNIONS

NCUA LETTER TO CREDIT UNIONS NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and

More information

PLASTIC CARD FRAUD. Russell G. Smith and Peter Grabosky Australian Institute of Criminology

PLASTIC CARD FRAUD. Russell G. Smith and Peter Grabosky Australian Institute of Criminology PLASTIC CARD FRAUD Russell G. Smith and Peter Grabosky Australian Institute of Criminology Paper presented at the conference Crime Against Business, convened by the Australian Institute of Criminology,

More information

Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99

Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99 New South Wales Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009 No 99 Contents Page 1 Name of Act 2 2 Commencement 2 Schedule 1 Principal amendments to Crimes Act 1900 No 40 3 Schedule

More information

White paper. Biometrics and the mitigation of card-related fraud

White paper. Biometrics and the mitigation of card-related fraud White paper Biometrics and the mitigation of card-related fraud The Aadhaar scheme, primarily envisaged to provide every resident proof of identity, holds a great deal of promise for other applications

More information

Preventing Identity Theft National City Bank. How to protect your identity

Preventing Identity Theft National City Bank. How to protect your identity Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to

More information

Identity Theft Packet

Identity Theft Packet BOULDER POLICE DEPARTMENT 1805 33 rd Street Boulder, CO 80301 Identity Theft Packet ** Use this packet when the crime involves the stealing of someone's identity, such as when a victim finds out that someone

More information

Model Spent Convictions Bill - Consultation paper

Model Spent Convictions Bill - Consultation paper Model Spent Convictions Bill - Consultation paper Background The Standing Committee of Attorneys-General is working on a project to design a national model Bill for a spent-convictions scheme. A spentconvictions

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

Strategy for Mobile ID

Strategy for Mobile ID Mobile ID Devices Strategy for Mobile ID 20 September 2013 Version 2.1 Strategy for Mobile ID Solutions Contents Summary...1 Context...2 Police and immigration services...2 Mobile solutions generally...2

More information

Personal Security - Preventing and Curing Identity Theft

Personal Security - Preventing and Curing Identity Theft identity theft tool kit How to protect yourself against identity theft Contents What is identity theft? 3 How can someone steal my identity? 4 Protecting yourself against identity theft 5 How can I tell

More information

Identity Theft is a Crime in the State of New Jersey.

Identity Theft is a Crime in the State of New Jersey. NEW JERSEY STATE POLICE Identity Theft: A Victim s Reference Identity Theft occurs when someone uses your personally identifying information like your name, Social Security number, or credit card number

More information

In order to consider your application we kindly ask that you undertake the following tasks:

In order to consider your application we kindly ask that you undertake the following tasks: The University of Queensland Brisbane Qld 4072 Australia Telephone (07) 336 52857 Facsimile (07) 334 67684 Email: cardservices@uq.edu.au Internet: www.fbs.uq.edu.au Dear UQ Corporate Credit Applicant,

More information

TERMS AND CONDITIONS FOR THE ICICI BANK INDIAN RUPEE TRAVEL CARD

TERMS AND CONDITIONS FOR THE ICICI BANK INDIAN RUPEE TRAVEL CARD TERMS AND CONDITIONS FOR THE ICICI BANK INDIAN RUPEE TRAVEL CARD The following terms and conditions ( Terms and Conditions ) apply to the ICICI Bank Travel Card facility provided by ICICI Bank. For your

More information

I know what is identity theft but how do I know if mine has been stolen?

I know what is identity theft but how do I know if mine has been stolen? What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card

More information

An article on PCI Compliance for the Not-For-Profit Sector

An article on PCI Compliance for the Not-For-Profit Sector Level 8, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 An article on PCI Compliance for the Not-For-Profit Sector Page No.1 PCI Compliance for the Not-For-Profit Sector

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet In this packet: Information and Instructions Section 1, # of pages 6 Fair and Accurate Credit Transactions Act of 2003 Section 2, # of pages 3 ID Theft Affidavit Section

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet is to be completed once you have contacted the Lafayette County Sheriff s Department and obtained a report number related to your

More information

Merchant Business Solutions. Protecting business against credit card fraud.

Merchant Business Solutions. Protecting business against credit card fraud. Merchant Business Solutions. Protecting business against credit card fraud. Version 4.0 May 2011 Contents Protect your business 3 Authorisation 4 Chargebacks 5 Verification of Purchaser 6 Types of goods

More information

How To Get A Credit Card From A Fraudulent Account

How To Get A Credit Card From A Fraudulent Account Information and Instructions This packet is to be completed once you have contacted New York State University Police and obtained a police report number related to your identity theft case. To obtain a

More information

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft

Brief to the House of Commons Standing Committee on Access to Information, Privacy and Ethics on the subject of Identity Theft Canadian Internet Policy and Public Interest Clinic Clinique d intérêt public et de politique d internet du Canada Brief to the House of Commons Standing Committee on Access to Information, Privacy and

More information

OCC BULLETIN OCC 98-38. Purpose. Summary of Key Points. Administrator of National Banks. Subject: Technology Risk Management: PC Banking

OCC BULLETIN OCC 98-38. Purpose. Summary of Key Points. Administrator of National Banks. Subject: Technology Risk Management: PC Banking Subject: Technology Risk Management: PC Banking Description: Guidance for Bankers and Examiners To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal

More information

ID Fraud & Law Reform

ID Fraud & Law Reform ID Fraud & Law Reform Philippa Lawson, Director Canadian Internet Policy and Public Interest Clinic University of Ottawa, Faculty of Law www.cippic.ca BC FIPA Privacy and ID Theft Conference Vancouver,

More information

Vital Statistics audit of the Birth and Death Certificate Imaging System

Vital Statistics audit of the Birth and Death Certificate Imaging System OFFICE OF THE CITY AUDITOR AUDIT OF THE VITAL STATISTICS BIRTH AND DEATH CERTIFICATE IMAGING SYSTEM Paul T. Garner Assistant City Auditor Prepared by: Tony Aguilar, CISA Sr. IT Auditor Bill Steer, CPA,

More information

Fraud. Wrongful or criminal deception intended to result in financial or personal gain.

Fraud. Wrongful or criminal deception intended to result in financial or personal gain. Fraud Wrongful or criminal deception intended to result in financial or personal gain. Fraud in the Taxi Industry Taxi services are unique our payments occur where the customers are, not at a single place

More information

Fraud Guide Fraud Protection

Fraud Guide Fraud Protection Fraud Guide Fraud Protection A simple guide on how to protect yourself against fraud. A simple guide on how to protect yourself against fraud It seems like every day there are new reports of different

More information

IDENTITY SECURITY NATIONAL IDENTITY SECURITY STRATEGY. Identity crime and misuse in Australia

IDENTITY SECURITY NATIONAL IDENTITY SECURITY STRATEGY. Identity crime and misuse in Australia NATIONAL IDENTITY SECURITY STRATEGY Identity crime and misuse in Australia Key findings from the National Identity Crime and Misuse Measurement Framework Pilot IDENTITY SECURITY ISBN: 978-1-925118-34-6

More information

Identity Theft Victim s Packet

Identity Theft Victim s Packet Identity Theft Victim s Packet Information and Instructions This packet should be completed once you have contacted Chandler Police Department and obtained a police report number related to your identity

More information

Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.

Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals. White Paper An Overview of Complementary Approaches Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals. February 2010 Risk Solutions Financial Services Introduction

More information

Fraud Protection, You and Your Bank

Fraud Protection, You and Your Bank Fraud Protection, You and Your Bank Maximize your chances to minimize your losses Presentation for Missouri GFOA April 2011 By: Terry Endres, VP, Government Treasury Solutions Phone: 314-466-6774 Terry.m.endres@baml.com

More information