Session 40: Are Your Valuable Documents Vulnerable to Fraud?

Size: px
Start display at page:

Download "Session 40: Are Your Valuable Documents Vulnerable to Fraud?"

Transcription

1 Session 40: Are Your Valuable Documents Vulnerable to Fraud? Ellen Carter Product Manager The Relizon Company 1

2 Table of Contents INTRODUCTION... 3 OVERVIEW WHAT ARE VALUABLE DOCUMENTS... 3 THE NEED FOR PROTECTED DOCUMENTS (FACTS/FIGURES)... 4 FUTURE OF PAPER CHECKS... 5 FRAUD ON THE RISE... 5 INDUSTRY ISSUES PADLOCK ICON... 6 LEGAL LIABILITY AND ISSUES... 7 CHECK LAW METHODS OF FRAUD... 9 COMPLETE DOCUMENT PROTECTION LAYERING SAFEGUARDS DOCUMENT SECURITY FEATURES PRINTING AND DESIGN BASED FEATURES INKS SECURITY PAPERS POSITIVE PAY REFERENCES

3 Overview Any corporation or individual that issues checks or other valuable documents is a possible target for document fraud. An organization cannot be too small, or too large, to be a victim. In fact, many small- to medium-size businesses are prime targets. However, one thing is certain no matter what size the company; fraud represents both a financial loss and an affront to the victim. Because recovery of losses are rare, prevention is generally seen as the only viable course of action. This manual will highlight not only the various types of document security, but will also: Clarify industry issues concerning checks and other secure documents. Define image-friendly technology. Detail the requirements for Padlock Icon usage. Highlight a variety of secure documents. Provide industry facts and figures. What Are Valuable Documents? Valuable documents can be any document that has monetary worth and could be targeted for fraud. While it is obvious negotiable documents such as checks and gift certificates need protection, some official and original documents need protection from fraud as well. Consider the following: Official Documents Certificates (Birth, Death, Title, Ownership, etc.) Transcripts & Diplomas Identification & Membership Cards ISO (and other certification) Documents Permits and Licenses (hunting, fishing, building, driving, etc.) Vehicle Registrations Original Documents Admission & Event Tickets Certificate of Authenticity Labels and Packaging (proof of purchase, tamper-indicating seals, etc.) Licenses (software, business, etc.) Merchandise Tags Point of Sale Receipts Prescription Forms* Proof of Insurance Negotiable Documents Airline Tickets, Bus Transfers & Boarding Passes Checks (accounts payable, payroll, medical reimbursement, expense, dividend, etc.) Coupons Credit Refund Forms Gift Certificates Hotel Vouchers Money Orders & Travelers Checks Rebate Coupons *Some state pharmaceutical boards have their own standards for printed prescription forms. 3

4 Overview The Need for Protected Documents (Facts/Figures) The actual extent of document fraud is difficult to establish due to the fact that many businesses do not report their losses, choosing to absorb them rather than face negative publicity. It is estimated that less than one-third of banks report all incidences of check fraud. In addition, no known entity tracks hard-to-quantify items such as fraudulent transcripts and prescriptions. The media s focus on violent crimes such as bank robberies tends to further skew the public s view of the actual extent of document fraud. Ask yourself which is more prevalent, bank robberies or check fraud and then compare these dated but still relevant statistics: Nationwide Annual Occurrences Estimated Daily Occurrences Bank Robberies* Check Fraud** 7,700*** 500,000, ,369,863 Estimated $77,000,000 $16,000,000,000 Dollars Lost % of Funds 20% < 13% Recovered *FBI, **Ernst & Young, National Check Fraud Center, (Estimated $12 billion in 1996.) ***Down from 8,046 in (Bank Security Report) Consider these other statistics: There are more cases of check fraud each day in the US than there are armed bank robberies in a year. US Government Accounting Office reportedly paid $28 billion in benefits to individuals who used counterfeit identification (official documents such as birth certificates and drivers licenses). An estimated $750 million is lost each year due to fraudulent coupons and gift certificates. An additional $700 million is lost annually from duplicated or altered sales receipts. 5-8% of the world trade (approximately $250 - $300 billion per year) is counterfeit. Known counterfeit products include clothing, airplane and auto parts, infant formula, toys, and pharmaceuticals such as birth control pills. (International Anti-Counterfeiting Coalition, Holography News) * Check fraud is estimated to grow by 2.5% annually. (American Banker) The average fraudulent check totals $1,775. (American Bankers Association)* The number of cases involving fraudulent checks over $100,000 has more than tripled in the last decade. (Loder, Drew & Associates, Inc., FBI)* *Losses are compounded by cost of investigation, lost employee time, business disruption, legal fees and settlement costs incurred when the matter is brought to court. Further, once a business has become a victim of fraud, there are untold costs relating to loss of community goodwill and trust by their clients. Additional costs may include replacement cost of faulty fraudulent parts or forms, warranty work, loss of market share and tarnished reputation in the marketplace. 4

5 Future of Paper Checks Future of Paper Checks In 1979, nearly 33 billion checks were written in the US. The mid 1990s saw that figure peak around 49 billion. The year 2000 was on the front end of the downward trend with only (ONLY!) 42 billion checks being written. Estimates are that paper check volume will continue to decline at a rate of 1 billion checks per year reaching 32 billion by (The Green Sheet) Billions Any way you look at the numbers, there are still a lot of checks written in the U.S. There still were more 10 0 checks issued for payment in 2000 [in the US] than in any other industrialized country. In fact, in every 1979 mid 1990s industrialized country except the U.S., check volumes dropped dramatically during the 1990s. (The Green Sheet) Consumer vs. Business Checks While the actual number of checks written each year continues to decline, the percentage mix of consumer-issued versus business-issued checks is a most interesting statistic. At the height of US check volume the mix was 60/40, with 60 percent of all checks being issued by consumers. A 2002 analysis by the Federal Reserve saw that mix change to 51/49. This change in mix can be attributed to consumers increased use of electronic transactions such as credit cards, debit cards and on-line bill paying services. Clearly electronic transactions have and will continue to have an effect on the number of checks consumers write each year. Although many companies would like to move in this direction, at the turn of the century most companies were not capable of handling electronic funds transfer (EFT). Additionally, electronic transactions represent an unknown and a new set of risks. A recent General Accounting Office report to Congress cited that nearly half of the institutions surveyed had yet to take steps the government deemed as necessary to limit online banking risks. Fraud on the Rise The combination of a large number of targets, low start-up investment, and low likelihood of prosecution has helped to increase significantly the incidences of fraud. Fifteen years ago, an investment of $250,000 was needed to purchase printing technology to produce a fraudulent color document. Today it s possible to purchase equipment that will allow accurate reproduction of documents for under $2,000 (PC $1,000; graphics software $400; scanner $100; color printer $400). Not only has the cost decreased, the time for a counterfeiter (skilled and unskilled alike) to produce counterfeit documents takes minutes using today s technology compared to weeks or months in years past. And for criminals not willing to make even this small investment, the alteration of an inadequately protected document can be accomplished for less than $5.00! To compound the problem, police departments report there s not a lot of emphasis for them to go out and arrest amateur check forgers. If arrested, district attorneys don t generally want to spend time with a case that s not high profile. If they do, there s no space in already overcrowded prisons for perpetrators of these non-violent crimes. 5

6 Industry Issues Padlock Icon With the growing problem of document fraud, the need to enhance security of the traditional check was recognized. Check Payment Systems Association (CPSA) developed the Enhanced Check Security Features Padlock Icon (Padlock Icon) to provide an indication to individuals accepting checks that security features have been incorporated in the design of the check, in the production process, and in the materials being used. It is generally agreed that the effectiveness of a security feature is greatly impaired if the person verifying authenticity doesn t know what to look for or is unable to recognize the feature. The Padlock Icon and accompanying warning box make it clear that there are specific safeguards included in the document and alert the person (cashier, bank teller, etc.) to inspect the document carefully. In addition, the Padlock Icon and the listed features may cause an experienced criminal to pass up the document in favor of a less protected one. In order to print the Padlock Icon on documents, CPSA must license the printing company. This license signifies that the printer agrees to comply with CPSA guidelines on all documents where the Padlock Icon is printed. Document Requirements In order to use the Padlock Icon, the following requirements must be met: A minimum of three overt features must be present. * The document must contain alteration protection and duplication protection. The Padlock Icon must appear on face (preferred location is to right of the legal amount area or the word Dollars ). No registered symbol ( ) should appear on the face. Directions to refer to document backer for listed security features must also appear on the document face. A warning box must appear on back listing at least two overt features. The Padlock Icon with registered symbol ( ) must be printed on back. * The Padlock Icon printed on the face along with the Padlock Icon and warning box printed on the back of the document represents one feature. Therefore, only two additional features must be present to satisfy the minimum requirement. 6

7 Industry Issues Legal Liability and Issues Document security is easier to understand if there is a knowledge of the legal issues driving it. While you don t have to be a legal expert to understand document security, it is important to be aware of legal terms and issues, namely the Uniform Commercial Code, due diligence, comparative negligence and Regulation CC. Uniform Commercial Code (UCC) The UCC is a comprehensive law governing commercial transactions. It includes ten articles, two of which pertain to checks Article 3 (negotiable instruments) and Article 4 (bank deposits and collections). Although these articles contain legalese and their adoption may vary somewhat by state, their basic premise asserts banks and/or their customers can be held liable for check fraud. Prior to revisions made in 1990, a single party, frequently the bank, would be held responsible for losses in check fraud cases. Now it is possible for the check issuer to be held liable for forged checks if ordinary care or due diligence was not taken by them to protect their negotiable documents. The intent of the 1990 UCC revisions was to place the risk of loss on the party in the best position to prevent the loss. More information on each states specific adoption of the UCC can be found at Due Diligence Simply stated, due diligence means recognizing potential threats and taking reasonable action to help protect against these threats. Ordinary Care Ordinary care requires check issuers to follow reasonable commercial standards of care prevailing in their industry of business. Ordinary care includes, but is not limited to, keeping checks in a safe place, reviewing statements promptly, limiting access to checks and placing security features on the check. Comparative Negligence Prior to the 1990 UCC revision, losses were allocated on an all-or-nothing basis with the burden usually borne by the financial institution. Under the revised code, when the bank, check issuer and/or accepting party have all been negligent in some way, the UCC provides guidelines for allocating losses between the parties according to their respective levels of fault. In lay terms, comparative negligence means that banks are no longer solely responsible for financial loss due to fraud. If the check issuer is found to be negligent (having not practiced due diligence or ordinary care), they will be held responsible for part, if not all, of the loss. The judgment of negligence is determined based upon whether the accepting party or bank could have easily recognized the fraudulent document, and if the issuer adequately protected the document. A recent American Bankers Association Check Fraud Survey reported that a significant proportion of mid-size and large banks successfully used the contributory negligence rule to reject or reduce losses. 7

8 Check Clearing in the 21 st Century Act Are Your Valuable Documents Vulnerable to Fraud? Industry Issues Becoming an official law October 2004, Check Clearing in the 21 st Century Act (referred to as Check Law 21 ) will continue to have a significant impact on paper checks for years to come. A key turning point in the check payments industry, Check Law 21 allows financial institutions to digitize (image) paper checks and process the image in place of the paper check (check truncation). Under Check Law 21 the check image, and any resulting substitute checks, are the legal equivalent of the paper checks they represent. A boon to the financial industry, Check Law 21 allows banks to use secure electronic networks instead of trucks, planes, and couriers to exchange checks. Checks will clear and post quicker. Some fraudulent and non-sufficient funds (NSF) checks may even be identified as early as the point of sale by the accepting merchant. Check Law 21 does not mandate check truncation. It does, however, allow for the check image to be covered by check law even though it clears electronically. Prior to Check Law 21, the image would be handled under laws governing electronic payments. Federal and state electronic funds transfer (EFT) laws are less bank-friendly than current check laws. 8

9 Methods of Fraud Methods of Fraud Disgruntled employees alter checks. Scalpers duplicate event tickets. Desperate job seekers forge college transcripts. Shoppers change the value of gift certificates. The facts prove that fraud is a major problem. But before you can protect against something, you have to know and understand what you are protecting against. You have to learn to think like a criminal. Understanding the different types of fraud (theft, alteration and duplication) is necessary when evaluating which solutions to select. Theft/Embezzlement Theft of checks and their eventual use, as well as issuing checks to ghost vendors or employees can represent a substantial risk to a corporation. To prevent internal theft or fraud, corporations must assume responsibility for implementing adequate procedures and controls, or ordinary care. Duplication (Counterfeiting) Counterfeiting can be described as the reproduction of an original document. As recent as fifteen years ago, an investment of $250,000 was needed to purchase printing technology that could produce a fraudulent color document. The criminal had to make a serious investment both in time and money to turn out an acceptable duplicate. Today it s possible to purchase equipment that will allow accurate scanning and printing of documents for under $2,000. Today s computer technology (affordable PCs, color copiers, printers, scanners and desktop publishing software) has moved counterfeiting documents from full-time professional forgers to the casual part-time forger. To make a counterfeit, criminals will scan an original document into a PC. The counterfeiter can then manipulate the document information (payee, dollar amounts, names, etc.) using desktop publishing software and print as many copies as they wish. While a counterfeit check may not exactly match the genuine check in appearance, it is important to note that counterfeiters need not create an identical document; they need only create one that appears legitimate. Another method of counterfeiting is duplication on color copiers. Today s high-end color copiers reproduce color documents that cannot be discerned from the original, even in side-by-side comparisons. With the adjusting of some dials and the push of a button, a near-original quality document can be produced. The availability of walk-up color copiers at public libraries and office supply stores reduces the investment required to just a few dollars. Alteration (Forgery) Forgery can be described as the alteration of an original document. Alterations can be made using various chemicals, erasing or scraping to remove original information. New information is then handwritten, typewritten or inserted with a laser printer or check imprinter. Alteration of an inadequately protected document takes only a matter of minutes and less than $5. Chemical Attack Various common chemicals, available quite legitimately for other purposes, are used to remove ink or toner from a document. The type of chemicals used depends upon the type of ink used to write the document. Laser Printed Images Toner-based images produced on laser printers can be removed in several ways. First, the information can be scraped off with a sharp object or lifted off using transparent tape. The images can also be removed using fingernail polish remover (acetone). 9

10 Complete Document Protection Layering Solutions Rapid advances in technology and the various successful methods for accomplishing fraud mean that it is virtually impossible to guarantee that a document is fraud-proof. The goal, therefore, is to help reduce the risk associated with the potential for fraud. One way to accomplish this goal is to layer security features on a document. Compare layering security on a document to adding security to a house. Before adding a solution it is critical to understand the objectives of the solution. Solutions should: Deter Fraud Like a guard dog inside a fence, visible security features make it clear that the document is protected and therefore not an easy target. Show Due Diligence Check issuers must be able to show (according to the UCC) that they ve taken reasonable actions to safeguard their checks. This includes, but is not limited to, adding security features. See Legal Liability and Issues Section. Fit the Potential Threats The geographical location of a house generally plays a significant role in determining the amount and types of security selected. The geographical location of checks should also play a role in their security. Because of the different region-specific document threats, some solutions are more appropriate in different parts of the country. Agricultural communities in California have seen a tremendous volume of payroll check fraud. Midwestern states have seen an increase in check washing. Check with your local law enforcement officials or FBI office for prominent activity in your region. Offer Appropriate Level of Protection The type and number of security features to add to a document depends upon the magnitude of the potential loss. The required level can be determined by examining several factors, including actual or perceived document value, possible loss (in money or breach of security) and the likelihood that a counterfeiter will go to extreme lengths to attack the document. Complement Verification Environment Understanding the environment in which a document will be accepted is critical in determining which solutions to offer. A gift certificate cashed in a controlled environment, such as the local jewelry store, should be designed differently than a payroll check that will be cashed in a variety of uncontrolled environments. Security features are worthless if the person verifying authenticity doesn t know what to look for, doesn t have the proper tools or is unable to recognize the feature. For instance, if invisible fluorescent ink is recommended, persons verifying authenticity should have a blacklight readily available. 10

11 Complete Document Protection Safeguards Layering solutions has proven to be the most successful method to reducing document fraud. The ideal is to prevent the fraud (and monetary losses) at the earliest point in the document s life cycle. Safeguards can be categorized by: 1) Processing controls the check issuer must implement, 2) Overt solutions on the document, and 3) Covert safeguards. Processing Controls Use secure documents. Layer security features to help combat against both duplication and alteration. Use an established, respectable source to ensure your valuable documents will be produced in a secure facility, delivered promptly, and process easily through the banking system. Maintain adequate physical security. Place all supplies of checks and other valuable documents in a secure, locked environment with boxes sealed until needed. (Boxes should be resealed each time documents are removed.) Protect ALL checks. This includes cancelled, voided, blank and issued. Destroy obsolete inventory on a timely basis. Arrange to have all valuable documents signed for and received by a specific person instead of shipped to a general loading dock or receiving area. Separate the check writing and account reconciliation functions. (The same person who balances the statements should not issue checks.) Limit the number of individuals authorized to sign a check. Require more than one signature on large dollar amounts. Immediately notify bank of any change to check writing process and personnel. (Former employees retain check signing authorization until the bank is advised to remove their name from the list of authorized signers.) Reconcile bank statements promptly and notify bank immediately when fraud occurs. The best defense for a bank in a forged-check case is to point to a deposit agreement that imposes a duty on the customer to notify the bank of any fraud within a relatively short time such as 30 days from the mailing date of the monthly statement. (Advice given to financial institutions in Clarks Bank Deposits and Payments Monthly.) Consider using protective devices on your computer such as multiple-level passwords. (Better Business Bureau) Print amounts and pay-to information in large, unusual type fonts to make alteration more difficult. (Consult your check printer or ANSI for valid font types and sizes.) Utilize bank fraud prevention services such as Positive Pay and account dollar limits. Deposit all incoming payments into a Deposit Only account. (Transactions on the account are deposits no checks are cleared on the account. After deposits are made, the bank can electronically transfer the funds into a checking account.) Consider vendor and employee payment by Electronic Funds Transfer (EFT). 11

12 Complete Document Protection Perform reference and background investigations on all prospective employees. (Include any individual that may come in contact with valuable documents i.e., Mail Room, Receiving, Accounts Payable, Payroll, etc.). Enforce mandatory vacations and rotate personnel. Emphasize to all employees the importance of being alert to fraud. Proactive (Overt) Safeguards Proactive safeguards are overt (obvious and apparent) features that deter potential criminals. The goal of these features is to make it clear that the document is protected and is therefore not an easy target. Overt features can be printed, ink-based or paperbased. Some of these features are outlined and discussed in detail in the following pages. Reactive (Covert) Safeguards Reactive safeguards are covert (hidden) features. Once fraud has been attempted, these safeguards draw attention to the fraud attempt and make the document worthless. Covert features can be printed, ink-based or paper-based. Some of these features are outlined and discussed in detail in the following pages. 12

13 Document Security Features Document Security Features It would be self-defeating to select several features that are all effective against one category of fraud, for instance duplication. This would leave the document defenseless against alteration. Because of this it is recommended that a minimum of five features be layered on any valuable document protecting against both alteration and duplication. Layering works best when printed/design features, ink-based features and paper-based features are combined. Following is a recap of the security features available from secure document printers. There are other, more specialized security features that are not included for reasons of cost, limited demand in the marketplace, availability, or incompatibility with laser printers. Printing and Design Void Feature Pantograph A pantograph designed to expose a hidden word such as VOID when scanned or copied on a color copier. Pros: Relatively inexpensive. Cons: To date, no company s void feature is 100% effective. Print densities of copiers can be varied to override the void security feature. Many scanners and some color copiers are able to reproduce the pantograph without the void feature emerging. In addition, void pantographs are not designed to work in black and white copiers. Micro Printing A covert feature, micro printing is type that is so small it appears as a line to the unaided eye. Upon close inspection with a magnifying glass, a specific word or message can be read. The MP icon can be added at the end of the micro print line to turn this covert feature into an overt one. Pros: Very low cost feature. Most copiers and scanners tend to reproduce micro printing as a line or shaded area making the words unreadable. Cons: Requires magnifying glass to view. Teller must take time to find micro printing, retrieve magnifying glass and view line of type. Prismatic Printing Often referred to as split fountain or rainbow printing, this technique blends two or more colors of ink into a single image. Typically one plate and one ink tower is used as different ink colors flow side-by-side down the ink train to create an image effect similar to the way light blends through a prism. Pros: The resulting blend of inks challenges older color copiers and scanners to simulate the original. Creates an eye-pleasing, attractive design. Cons: Newer copiers and scanners can reproduce originals without difficulty. Adds significant cost to document. 13

14 Document Security Features High-Resolution Border Like the intricate borders on US currency, a high-resolution border printed on a document is not easily duplicated or copied. Pros: The detailed spaces and delicate lines tend to fill in and not duplicate exactly. Aesthetically pleasing and can be incorporated into most existing designs. Low cost. Cons: Person authenticating document (in most cases) will not have an original to compare document against. Padlock Icon A highly recommended security feature, this icon is central to the CPSA guidelines to enhance check security. Refer to Padlock Icon section for additional information. Pros: Industry standard. Low cost. Serves as security feature indicator to person accepting check. Serves as warning notice to would-be criminals. Cons: Low enforcement of license by CPSA. Low education level on Padlock Icon use in financial institutions. Artificial Watermark An artificial watermark is created using inks that range from transparent varnish to opaque white. Usually printed on the document back, it is visible when viewed at an angle and more difficult to see in direct reflected light. Pros: Customizable design. Because copiers and scanners view documents from a right angle, the watermark is nearly impossible to replicate with a copier or scanner. Cons: Can be reproduced using rubber stamp and special stationery watermark ink. Warning Bands A key component of any security system is a warning notice that advises potential criminals that there is protection in place. The warning band serves to deter criminals and send them looking for easier targets. Pros: Warning bands can be added to nearly any document without an increase in cost. Cons: An effective warning message should be relatively simple to understand and difficult to remove from the document. The message should also be specific, instructing the recipient to look for a specific color or features to authenticate the document. Multiple Colors Although new color copiers are making the forger's job easier, it is still harder to reproduce color than black and white. (Better Business Bureau) Pros: The use of color on documents increases the time and difficulty required to create a duplicate. Cons: Additional color increases cost of document. Non-Negotiable Stub Backer Another concern for valuable documents is the potential for an unprinted stub area. This is particularly true for documents printed on security paper. Consider the following: On a typical 8-1/2" x 11" laser cut sheet check, the check portion takes up approximately one-third of the sheet, the stub area takes another one-third. The remaining one-third area is typically left blank face and back. With this area left blank, the counterfeiter can reproduce the check in this area and have a duplicate check printed on safety paper! 14

15 Document Security Features Pros: Printed in the same color and density as the check backer, the non-negotiable backer prevents the unauthorized use of the unprinted stub area. Low cost. Highly secure. Cons: Back of document (stub areas) becomes unusable. Foil Stamping A reflective image stamped onto the document. Pros: The image will appear dark and non-reflective when copied. Traditional foil stamping is more effective when used in conjunction with an intricate design or when combined with embossing. Cons: Adds a moderate increase to the cost of the document. The availability of foil stamping kits has enabled counterfeiters to duplicate this feature using a laser printer. Embossing Embossing uses dies to create a raised image. Pros: Because the image is raised, it doesn t duplicate by scanning or copying. Cons: Because laser printers use heat and pressure to create an image, embossing generally is not laser compatible. Adds moderate increase to cost of document. Thermography Thermography also produces a raised, printed image. Pros: The lettering is raised from the surface and impossible to recreate with a scanner or laser printer. Cons: Do-it-yourself thermography kits are available in craft stores where stamp kit supplies are sold. Holograms Holograms belong to a class of images known as Optically Variable Image Devices (OVID). Highly valued for security, OVIDs can only be produced using expensive, specialized equipment. Inks Pros: Holograms cannot be replicated by color copiers, scanners or by standard printing techniques. Cons: Simply adding a hologram to your product will not prevent counterfeiting, but it significantly ups the ante for the counterfeiter. Thermochromic (Heat-Reactive) Ink When subjected to heat this specially formulated ink will change color then revert back to its original color (usually within seconds). Document authentication is as easy as rubbing the printed area between two fingers to trigger the color shift. Pros: No special devices needed to activate. Color shifting effect is impossible to photocopy or digitally recreate. No limit to the number of activations. Laser compatible. Cons: Requires teller to interact with document. Individuals with cold hands have difficulty generating enough heat to cause color shift. 15

16 Document Security Features Penetrating (Bleed Through) Ink As the name implies, dye in the numbering ink results in the gothic or MICR numbers penetrating the paper fibers, developing into a visible, mirror image number on the back of the document. Pros: Low cost. Cons: Requires teller to verify image on reverse. Ink does not bleed through consistently on all paper types. Invisible/Ultraviolet (UV) Fluorescent Undetectable under normal light conditions, this ink glows under an ultraviolet light source (blacklight). Pros: Fluorescent ink can be used to print wording, designs or even numbering. The fluorescent effect is virtually impossible to photocopy or digitally recreate. Cons: Requires ultraviolet light to verify. Coin-Activated Ink Opaque white or transparent ink that turns black when rubbed with the edge of a coin. Pros: When used to print a verification spot or an artificial watermark, the document can be instantly verified as original with the rub of a coin or a swipe of the pen. The reactive effect cannot be photocopied or digitally recreated. Cons: Requires teller to interact with document. Security Papers Today, plain bond paper is by far the most commonly used paper, accounting for approximately 80% of all secure documents. While regular bond is the least expensive option, it also provides the least (if any) document protection. Put another way, 80% of the secure documents produced are inadequately protected! Most secure paper manufacturers offer security papers in standard grades or levels. The individual features available in the various grades are outlined below. Chemical Reactive Stain Often referred to as a stain feature, chemical sensitivity is a key defense in the prevention of document alteration. Using a chemical to remove or alter an image causes a colored stain to appear on the face and/or back of the document making the alteration apparent. Pros: Reacts to most commonly used chemicals. Multiple reactants protect against a variety of chemicals and prevent forgers from using a second chemical to remove the first stain. Cons: Requires teller to be educated on, look for, and identify stain. Fourdrinier Watermarks A fourdrinier watermark is pressed into the paper by a dandy roll (a wire cylinder on papermaking machines) during the wet state of the papermaking process. Pros: The result is a two-dimensional (shaded both light and dark) image that can be seen from both sides of the paper yet difficult to reproduce. Cons: Requires teller to look for, and verify, watermark. 16

17 Document Security Features Artificial Watermark or Ghost Mark Printed using a varnish, opaque or transparent white ink, artificial watermarks resist photocopying. The mark is visible when viewed at an angle. Pros: Most paper-mill printed artificial watermarks are printed using coin reactive ink. Because copiers and scanners view documents from a right angle, the watermark is nearly impossible to replicate with a copier or scanner. Cons: Artificial watermarks are provided as a standard offering on some security papers and not customizable. Can be reproduced using rubber stamp and special stationery watermark ink. Toner Retention Coating A coating is applied at the paper mill that helps protect laser-printed images. The coating reacts under fuser temperature to form a more secure bond between the paper and toner. Pros: The result is an increased resistance to common methods used to scrap or lift toner in order to alter a document. Cons: Temperature and dwell time of printer can greatly affect the effectiveness of the coating. Visible Fibers & Invisible (Fluorescent) Fibers Synthetic fibers are added during the papermaking process to make replication of the document more difficult. Pros: By putting an array of fiber colors into the design one can greatly complicate counterfeiting by making it necessary to print many extra colors. Invisible fibers are invisible to the naked eye but fluoresce when viewed under an ultraviolet light source. Because fibers are invisible, they resist photocopy replication. Cons: Requires teller to interact with the document. Fluorescent fibers require the use of an ultraviolet light to verify. Security Thread Commonly found in US currency, these printed threads are embedded into paper during the papermaking process. Recent developments by Appleton Papers allow the thread to be digitally coded with information. This technology allows an individual piece of paper to be given a unique and identifiable signature or an entire run to contain the same identification code. Pros: The continuous thread can be viewed when held to the light, but not easily reproduced on a copier. The threads can be fluorescent, micro printed, or even multicolored. Cons: Requires teller to interact with document. May require the use of special verification devices. Increases cost of document. Taggants Added during the papermaking, machine-readable taggants are included in paper to provide embedded protection. Either handheld or in-line readers scan a sheet. If the proper mix of taggants is present, the sheet/document passes as authentic. If the proper mix is absent, the sheet/document will fail. 17

18 Positive Pay Positive Pay Positive Pay is the most sophisticated of all account reconciliation services. It is a process through which the customer and bank work together to identify items presented for payment. How it Works The company sends to the financial institution a transmission or tape containing the serial numbers and amount of each check issued that day. As checks are presented for payment, the financial institution compares the actual check with the issued list. Any exceptions are reported to the client. Exceptions can include: Stale dated checks or checks not presented for payment within designated timeframe. Checks not on issued list. Check amounts different from issued amounts. Duplicated check numbers. Stop payment exists. While Positive Pay is a highly secure process, no feature or process is 100% fraud-proof. The Positive Pay process generally checks the MICR line data (amount, account and check number). Should the check be intercepted and the payee altered, the Positive Pay process generally will not catch the illegal alteration. Steps to protect against alteration must also be taken. 18

19 References References Abagnale, Frank W. The Security Group. Counterfeiting, Forgers and News Technology. Abagnale, Frank W. Tips for Counterfeit Detection. Client Service Bulletin. Appleton Papers Inc. Your Guide to Document Protection, Better Business Bureau. Tips for Businesses: Beware of Desktop Forgery, Boise Cascade. Security Pays, 1994 and Security of Documents, circa Check Fraud Working Group. Check Fraud: A Guide to Avoiding Losses, February Check Payment Systems Association. Guideline for Use of the Enhanced Check Security Features Padlock Icon, Revised March The Columbia Encyclopedia, Fifth Edition Copyright 1993, Columbia University Press. Federal Reserve Financial Services, Press Release August 14, Fiedler, Eric. Risky Business. Business Forms, Labels and Systems, June The Flesh Company. Document Security for Business Executives, Flynn, Susan Keen. A Line of Defense. FORM, November The Green Sheet, Check Volume is Checking Out!, by Richard Crone and Ed Bachelder, Issue 03:02:01, February 10, The Green Sheet, It s Time to Prepare for a New Era of Paperless Checks, by Patti Murphy, Issue 04:02:02, February 23, The Green Sheet, American Are Writing Fewer checks, But They re Still Writing Lots of Checks, by Patti Murphy. Global Concepts Payment Systems Consulting. The Indelible Check, Guard, Mary Beth. Anatomy of a Check, Part One and Two. Bankinfo.com, Guard, Mary Beth. 20 UCC Provisions Every Banker Should Know, Part One and Two. Bankinfo.com, March 3, House, Katherine L. Banking on Imaging, FORM, November National Check Fraud Center, Fraud Partners. Guarding Your Business Against Check Fraud, Vol. 5, No. 1, Part One, February Owens, Charles L. Federal Bureau of Investigation, Financial Institution Fraud, Chief Financial Crimes Section. Statement Before the U.S. Senate Committee on Banking Housing, and Urban Affairs Subcommittee on Financial Services, Washington, D. C. September 16, SICPA. Ink Related Features Useful in the Design and Production of Value Documents, Defense Against Unauthorized Color Photocopy and Document Security Inks, February Wandling, Dave. Business Printing Technologies Report, Ask the print professional, August

For more information, please refer to our Check Armor FAQ: https://www.blackbaud.com/files/pdf/blackbaud forms/checkarmorfaq.pdf

For more information, please refer to our Check Armor FAQ: https://www.blackbaud.com/files/pdf/blackbaud forms/checkarmorfaq.pdf Check fraud is one of the largest challenges facing nonprofits and financial institutions today. With the advancement of computer technology, it is increasingly easy for criminals to manipulate checks

More information

Laser Checks. High Security Blank Check Stock

Laser Checks. High Security Blank Check Stock Laser Checks High Security Blank Check Stock Fold Perforations Relyco Premium Laser Checks High-Security Blank Check Stock to Protect Your Business Multiple Check Sizes The Right Check for Your Business

More information

Enhanced Check Security Features Padlock Icon

Enhanced Check Security Features Padlock Icon Guideline for Use of the Enhanced Check Security Features Padlock Icon Revised 1/2009 Check Payment Systems Association 2025 M Street, NW Suite 800 Washington, DC 20036 Tel: 1-202-367-1144 1 Guideline

More information

issued by your financial institution.

issued by your financial institution. Discover the peace of mind that you will experience when choosing the protection provided by our SECURESTAR Program. Protection that helps prevent loss due to check fraud including altered and counterfeited

More information

CHECK FRAUD. Federal Reserve System

CHECK FRAUD. Federal Reserve System CHECK FRAUD Federal Reserve System Check fraud affects every financial institution, every business, and every individual throughout the United States and around the world. Industry sources estimate that

More information

Combating Fraud on Corporate Checking Accounts

Combating Fraud on Corporate Checking Accounts Combating Fraud on Corporate Checking Accounts A Bank of America White Paper One in a series of white papers prepared by Bank of America on key issues of interest to corporate treasurers. The information

More information

Uncompromised Summary

Uncompromised Summary PREMIER LASER CHECKS 356 938576 6524 1265 35494 931589 1425 938576 3456 3562454938576 22345 938576 322256 444352 6524 1265 3685 4287 625 35494 931589 2245 9582234 78 6525 138576 3456 9655 938646 3 3562454938576

More information

EMR 1, / 1, 2008 1, 2008. CMS

EMR 1, / 1, 2008 1, 2008. CMS Dear Prescriber, This letter contains critically important information regarding compliance with the Medicaid Tamper Resistant Requirements. As of October 1, all fee-for-service Medicaid prescriptions

More information

State of Vermont Office of Vermont Health Access (OVHA) Pharmacy Benefit Management Program

State of Vermont Office of Vermont Health Access (OVHA) Pharmacy Benefit Management Program Dear Prescriber: State of Vermont Office of Vermont Health Access (OVHA) Pharmacy Benefit Management Program Phase II: Federal Medicaid Law Regarding Tamper-Resistant Prescription Drug Pads October 1,

More information

CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation

CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation Check 21, Remote Deposit Capture and Check Fraud.in Layman s Terms Check 21 s Final Rule includes an Indemnity provision

More information

The Advantages of Security Features

The Advantages of Security Features SECURITY FEATURES ON PRINTED DOCUMENTS by Jeff Jensen It is easier than ever to forge documents because technology is becoming more powerful on a daily basis. Most people do not realize that color copiers

More information

July 17, 2008. Dear Medicaid Director:

July 17, 2008. Dear Medicaid Director: July 17, 2008 Dear Medicaid Director: This letter contains critically important information regarding compliance with the Medicaid Tamper Resistant Requirements. As of October 1, 2008, all fee-for-service

More information

National Council for Prescription Drug Programs

National Council for Prescription Drug Programs National Council for Prescription Drug Programs February 1, 2008 Dear Medicaid Director: This letter is a follow up to a previous letter sent to State Medicaid Directors on January 2, 2008, by 90 state

More information

HOLDER IN DUE COURSE and CHECK FRAUD

HOLDER IN DUE COURSE and CHECK FRAUD HOLDER IN DUE COURSE and CHECK FRAUD Frank Abagnale President, Abagnale and Associates www.abagnale.com Greg Litster President, SAFEChecks Canoga Park, CA (800) 949-2265 greg@safechecks.com Every company

More information

Copyright 2011 TROY Group Inc.

Copyright 2011 TROY Group Inc. OVERVIEW TROY Group, Inc. has developed a new digital printing technology for security printing (patents awarded worldwide, contact TROY for further information). This new technology is the TROY Laser

More information

Laser Checks. High Security Blank Check Stock by

Laser Checks. High Security Blank Check Stock by Laser Checks High Security Blank Check Stock by Relyco Premium Laser Checks High-Security Blank Check Stock to Protect Your Business Fold Perforations Multiple Check Sizes arning Band Micro Perforations

More information

Business Mobile Deposit Capture Terms & Conditions

Business Mobile Deposit Capture Terms & Conditions Business Mobile Deposit Capture Terms & Conditions DESCRIPTION The mobile deposit capture services ("Mobile Deposit" or "Services") are designed to allow you to make deposits to your checking, money market

More information

CAPITAL PERSPECTIVES DECEMBER 2012

CAPITAL PERSPECTIVES DECEMBER 2012 CAPITAL PERSPECTIVES DECEMBER 2012 MITIGATING PAYMENT FRAUD RISK: IT S A WAR ON TWO FRONTS Payment fraud continues to be one of the biggest risk management challenges facing corporate treasury managers

More information

MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM

MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM MOBILE DEPOSIT AGREEMENT AND DISCLOSURE ONLINE BANKING AGREEMENT ADDENDUM This Addendum ( Addendum ) to the Citizens State Bank of Paola Online Banking Agreement between you and Citizens State Bank of

More information

BANK OF BARODA (NEW ZEALAND) LIMITED (BOBNZ) VISA CLASSIC DEBIT CARD. User Guide

BANK OF BARODA (NEW ZEALAND) LIMITED (BOBNZ) VISA CLASSIC DEBIT CARD. User Guide BANK OF BARODA (NEW ZEALAND) LIMITED (BOBNZ) VISA CLASSIC DEBIT CARD User Guide Table of Contents Page No Welcome 2 Know your Visa Classic Debit Card 3 Important Information 4 Keeping your Visa Card safe

More information

Targeting businesses can be much more profitable for fraudsters than personal identity theft.

Targeting businesses can be much more profitable for fraudsters than personal identity theft. When You Aren t You: Corporate Identity Theft A New Snake in the Grass... (and Check Fraud Still #1.) CorporateIdentity Theft CorporateIdentity Theft is one of the newest financial threats facing businesses

More information

GUIDE TO PROTECTING YOUR BUSINESS

GUIDE TO PROTECTING YOUR BUSINESS GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest

More information

May 2015. Blackbaud Forms. Compatible Checks and Forms

May 2015. Blackbaud Forms. Compatible Checks and Forms May 2015 Compatible Checks and Forms About Blackbaud Serving the nonprofit, charitable giving and education communities for more than 30 years, Blackbaud (NASDAQ: BLKB) combines technology solutions and

More information

IDENTITY THEFT PREVENTION PROGRAM

IDENTITY THEFT PREVENTION PROGRAM IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious

More information

Check Fraud, Identity Theft and Embezzlement

Check Fraud, Identity Theft and Embezzlement Invest in you SM F R A N K W. A B A G N A L E S Check Fraud, Identity Theft and Embezzlement VOLUME II INSIDE THIS ISSUE Check Fraud A National Epidemic........ 1 Check Fraud Prevention Best Practices....

More information

CREDIT CARD PROCESSING GLOSSARY OF TERMS

CREDIT CARD PROCESSING GLOSSARY OF TERMS CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.

More information

DOCUMENT SECURITY ISSUES

DOCUMENT SECURITY ISSUES DOCUMENT SECURITY ISSUES Part of a Series of Datacard Group White Papers for the Secure Document Issuer DESIGNING AN ID DOCUMENT FOR ENHANCED SECURITY Overview Governments today are being driven to increase

More information

Online Check Deposit. Check Standards and Troubleshooting Guide. General Overview. What are acceptable items vs. unacceptable items?

Online Check Deposit. Check Standards and Troubleshooting Guide. General Overview. What are acceptable items vs. unacceptable items? Check Standards and Troubleshooting Guide Online Check Deposit General Overview What is Online Check Deposit? Online Check Deposit is a depository service that provides you with the ability to capture

More information

Business Merchant Capture Agreement. A. General Terms and Conditions

Business Merchant Capture Agreement. A. General Terms and Conditions Business Merchant Capture Agreement A. General Terms and Conditions Merchant Capture (MC), the Service, allows you to deposit checks to your LGE Business Account from remote locations by electronically

More information

EAST WEST BANK MOBILE REMOTE DEPOSIT SERVICES AGREEMENT

EAST WEST BANK MOBILE REMOTE DEPOSIT SERVICES AGREEMENT EAST WEST BANK MOBILE REMOTE DEPOSIT SERVICES AGREEMENT Mobile Deposit is designed to allow you to make deposits of checks ( original checks ) to your designated eligible accounts from your home or other

More information

Unit 2 The Basic Accounting Cycle

Unit 2 The Basic Accounting Cycle Unit 2 The Basic Accounting Cycle Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Business Transactions and the Accounting Equation Transactions That Affect Assets, Liabilities, and

More information

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine 1 Dear Nonprofit Leader, The single greatest asset of a nonprofit is arguably its reputation. When theft or misappropriation of assets

More information

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.

Plastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction. Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for

More information

BNZ Advantage Credit Card Terms and Conditions.

BNZ Advantage Credit Card Terms and Conditions. BNZ Advantage Credit Card Terms and Conditions. 1 May 2015 This document contains the terms and conditions that apply to BNZ Advantage credit card accounts operated by you, including the terms and conditions

More information

PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING:

PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: Citizens Bank Mobile Deposit Agreement PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: The Mobile Deposit Agreement (the Agreement ) is entered into by Citizens Bank (the Financial

More information

Mobile Banking Disclosure Statement

Mobile Banking Disclosure Statement Mobile Banking Disclosure Statement This disclosure provides information about Centier Mobile Banking services. By using this service you agree to the terms and conditions stated below and any other terms

More information

Merchant Best Practices & Guidelines

Merchant Best Practices & Guidelines National Bank of Abu Dhabi Merchant Best Practices & Guidelines Merchant Advice Version 1.0 January 24, 2016 Table of Content 1. Guidelines to reduce Merchant Risks... 3 1.1 Card Present Transactions...

More information

INTERNAL ACCOUNTING CONTROLS CHECKLIST FOR NTMA CHAPTERS

INTERNAL ACCOUNTING CONTROLS CHECKLIST FOR NTMA CHAPTERS P R E C I S I O N INTERNAL ACCOUNTING CONTROLS CHECKLIST FOR NTMA CHAPTERS Presented at NTMA 2004 Annual Convention Palm Springs, CA February 2004 National Tooling & Machining Association 9300 Livingston

More information

Merchant Card Processing Best Practices

Merchant Card Processing Best Practices Merchant Card Processing Best Practices Background: The major credit card companies (VISA, MasterCard, Discover, and American Express) have published a uniform set of data security standards that ALL merchants

More information

CHECK ENFORCEMENT GUIDEBOOK. Maricopa County PROGRAM. Attorney s Office. Where to submit a bad check. Bill Montgomery. Page 1

CHECK ENFORCEMENT GUIDEBOOK. Maricopa County PROGRAM. Attorney s Office. Where to submit a bad check. Bill Montgomery. Page 1 Page 1 Maricopa County Attorney s Office Bill Montgomery Maricopa County Attorney CHECK ENFORCEMENT GUIDEBOOK CHECK ENFORCEMENT PROGRAM Accepting a check What to do with a bad check How to submit a check

More information

Heritage Credit Union Mobile Deposit User Agreement Effective: April, 2016

Heritage Credit Union Mobile Deposit User Agreement Effective: April, 2016 Heritage Credit Union Mobile Deposit User Agreement Effective: April, 2016 This Agreement contains the terms and conditions for use of Heritage Credit Union s (HCU) Mobile Deposit service ( Mobile Deposit

More information

NBT Bank Personal and Business Mobile Banking Terms and Conditions

NBT Bank Personal and Business Mobile Banking Terms and Conditions This NBT Bank Mobile Banking terms and conditions will apply if you use a mobile device to access our Mobile Banking service. When you use NBT Bank s Mobile Banking service, you will remain subject to

More information

Viewpoint Construction Software www.viewpointforms.com 800.825.8649

Viewpoint Construction Software www.viewpointforms.com 800.825.8649 HECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITYCHECKSECURITY

More information

DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE

DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE DEBIT CARD & ELECTRONIC FUNDS TRANSFER DISCLOSURE The purpose of this Disclosure Statement is to make you aware of your rights and responsibilities when using our Debit Card and Electronic Funds Transfer

More information

UNIVERSITY FEDERAL CREDIT UNION ABILITY CARD TERMS AND CONDITIONS

UNIVERSITY FEDERAL CREDIT UNION ABILITY CARD TERMS AND CONDITIONS UNIVERSITY FEDERAL CREDIT UNION ABILITY CARD TERMS AND CONDITIONS Please keep these Terms and Conditions handy and refer to them when you need to. And remember, whenever you have a question, you can call

More information

Write Checks the Right Way

Write Checks the Right Way Write Checks the Right Way Guide G-220 Revised by Fahzy Abdul-Rahman 1 Cooperative Extension Service College of Agricultural, Consumer and Environmental Sciences CHECKS VS. OTHER PAYMENT METHODS Checks

More information

Fraud Protection, You and Your Bank

Fraud Protection, You and Your Bank Fraud Protection, You and Your Bank Maximize your chances to minimize your losses Presentation for Missouri GFOA April 2011 By: Terry Endres, VP, Government Treasury Solutions Phone: 314-466-6774 Terry.m.endres@baml.com

More information

Mobile Deposit Policy

Mobile Deposit Policy Mobile Deposit Policy Mobile Deposit, a deposit transaction delivery system, allows the Credit Union to receive digital information from deposit documents captured at remote locations (i.e., the Credit

More information

Medicaid Tamper-Resistant Prescription Requirements FAQs for Pharmacists

Medicaid Tamper-Resistant Prescription Requirements FAQs for Pharmacists Medicaid Tamper-Resistant Prescription Requirements FAQs for Pharmacists On April 1, 2008, all hand-written or computer-generated/printed Medicaid prescriptions were required to have at least one approved

More information

COVERAGE SECTION 3. FIDELITY COVERAGE

COVERAGE SECTION 3. FIDELITY COVERAGE COVERAGE SECTION 3. FIDELITY COVERAGE I. EMPLOYEE DISHONESTY COVERAGE - BLANKET The Insurer will pay for loss of, and loss from damage to, Covered Property resulting directly from the Covered Cause of

More information

CyberSource Merchant Account Guide. March 2008

CyberSource Merchant Account Guide. March 2008 CyberSource Merchant Account Guide March 2008 CyberSource Contact Information Please visit our home page at http://www.cybersource.com. To contact CyberSource Support, call 1-866-203-0975 (Pacific Time),

More information

How To Spot & Prevent Fraudulent Credit Card Activity

How To Spot & Prevent Fraudulent Credit Card Activity Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card

More information

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether

More information

Electronic Check Deposit User Agreement

Electronic Check Deposit User Agreement Electronic Check Deposit User Agreement These terms (Electronic Check Deposit Terms) will govern your use of LGE Community Credit Union Electronic Check Deposit (Electronic Check Deposit), and are incorporated

More information

How To Process Credit Card Receipts

How To Process Credit Card Receipts Marketplace Agreement Through Student Organization Finance Center Merchant Account To be submitted with the Credit Card Security Agreement This request is valid for one (1) year. The Recognized Student

More information

MOBILE DEPOSIT USER AGREEMENT ( AGREEMENT )

MOBILE DEPOSIT USER AGREEMENT ( AGREEMENT ) MOBILE DEPOSIT USER AGREEMENT ( AGREEMENT ) This Mobile Remote Deposit User Agreement ( Agreement ) contains the terms and conditions for the use of Mobile Remote Deposit that Capital Credit Union ( Credit

More information

Avoid completing forms in email messages that ask for personal financial information.

Avoid completing forms in email messages that ask for personal financial information. INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus

More information

Businesses: Payment by Cheque

Businesses: Payment by Cheque Businesses: Payment by Cheque As Canada s digital economy evolves, many Canadian businesses are examining their payment processes, considering the transition from paper to electronic payments. The efficiencies,

More information

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity

More information

BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL

BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL BEDFORD PUBLIC SCHOOLS BUSINESS OFFICE PROCEDURES MANUAL Revised 3-27-2014 TABLE OF CONTENTS Section 1: Section 2: Section 3: Section 4: Section 5: Section 6: Section 7: Section 8: Section 9: Cash Management

More information

NEIGHBORS FEDERAL CREDIT UNION REMOTE DEPOSIT CAPTURE SERVICES DISCLOSURE AND AGREEMENT

NEIGHBORS FEDERAL CREDIT UNION REMOTE DEPOSIT CAPTURE SERVICES DISCLOSURE AND AGREEMENT NEIGHBORS FEDERAL CREDIT UNION REMOTE DEPOSIT CAPTURE SERVICES DISCLOSURE AND AGREEMENT This Remote Deposit Capture Services Disclosure and Agreement ( Agreement ) governs the use of Remote Deposit Capture

More information

Torn Identity: Preventing New Forms of Corporate Identity Theft

Torn Identity: Preventing New Forms of Corporate Identity Theft Torn Identity: Preventing New Forms of Corporate Identity Theft Bonnie J. Hertz, CTP Cash Manager North Pacific Group, Inc. Greg Hansen VP, Product Management Wells Fargo Bank 1 Agenda Overview of fraud

More information

UNT Cash Control and Departmental Deposit Handbook

UNT Cash Control and Departmental Deposit Handbook UNT Cash Control and Departmental Deposit Handbook University of North Texas January 2014 Volume 2, Issue 1 STUDENT ACCOUNTING & UNIVERSITY CASHIERING SERVICES Table of Contents General Overview...1 Proper

More information

ZEBRA CUSTOM LAMINATE QUOTE REQUEST FORM Custom Laminate Quick Reference Guide: Added Security to Meet Your Needs

ZEBRA CUSTOM LAMINATE QUOTE REQUEST FORM Custom Laminate Quick Reference Guide: Added Security to Meet Your Needs ZEBRA CUSTOM LAMINATE QUOTE REQUEST FORM Custom Laminate Quick Reference Guide: Added Security to Meet Your Needs Zebra offers a range of high-security card solutions to meet customer needs for reliable,

More information

BWA Merchant Services. Credit Card Fraud Protection User Guide

BWA Merchant Services. Credit Card Fraud Protection User Guide 1 BWA Merchant Services Credit Card Fraud Protection User Guide 2 Contents: 1. How to reduce the risk of card present fraud... 3 2. How to reduce the risk of card not present fraud... 5 3. Delivering the

More information

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading

A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading A whitepaper on: Invisible and Fluorescing Bar Code Printing and Reading Important technical considerations that are the key to successful implementations Version 1.03 P a g e 2 OVERVIEW Background: Inks

More information

COUNTY OF TRINITY CASH HANDLING PROCEDURES

COUNTY OF TRINITY CASH HANDLING PROCEDURES COUNTY OF TRINITY CASH HANDLING PROCEDURES Prepared by the Trinity County Auditor/Controller s Office Revised October 1, 2009 TABLE OF CONTENTS I. Introduction--------------------------------------------------------------------1

More information

PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS

PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS PROTECT YOUR BUSINESS FROM LOSSES WHILE ACCEPTING CREDIT CARDS TABLE OF CONTENTS Introduction...1 Preventing Fraud in a Card-Present Environment...2 How to Reduce Chargebacks in a Card-Present Environment...4

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes

More information

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA

AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA Australian Payments Clearing Association AUSTRALIAN PAYMENTS FRAUD DETAILS AND DATA 214 Australian Payments Clearing Association Limited ABN 12 55 136 519 CONTENTS OVERVIEW 1 SECTION 1 Fraud rates 4 SECTION

More information

2012 CATA LOG. software compatible secure checks/forms custom options laser/continuous fraud prevention

2012 CATA LOG. software compatible secure checks/forms custom options laser/continuous fraud prevention software compatible secure checks/forms custom options laser/continuous fraud prevention 2012 CATA LOG Table of Contents / Ordering Information Table of Contents Ordering Information... 2 UCS Standard

More information

Revised March 2015. take a closer look Your easy-to-follow guide to checking your banknotes

Revised March 2015. take a closer look Your easy-to-follow guide to checking your banknotes Revised March 205 take a closer look Your easy-to-follow guide to checking your banknotes INTRODUCTION Maintaining confidence in the currency is a key objective of the Bank of England, and you too can

More information

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)

01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) 01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:

More information

Cash, Petty Cash, Change Funds, and Credit Cards

Cash, Petty Cash, Change Funds, and Credit Cards CASH As public servants, it is our responsibility to safeguard taxpayer s dollars while adhering to laws and regulations governing processes over cash handling. Internal controls over cash are necessary

More information

BUSINESS ONLINE BANKING AGREEMENT

BUSINESS ONLINE BANKING AGREEMENT BUSINESS ONLINE BANKING AGREEMENT This Business Online Banking Agreement ("Agreement") establishes the terms and conditions for Business Online Banking Services ( Service(s) ) provided by Mechanics Bank

More information

"You" and "your" mean the account holder(s) and anyone else with authority to deposit, withdraw, or exercise control over the funds in the account.

You and your mean the account holder(s) and anyone else with authority to deposit, withdraw, or exercise control over the funds in the account. FIRST BANK KANSAS Information about Electronic Fund Transfers The Electronic Fund Transfer Act and Regulation E require banks to provide certain information to customers regarding electronic fund transfer

More information

Ti ps. Merchant. for Credit Card Transactions. Processing Tips CARD ONE INTERNATIONAL INC

Ti ps. Merchant. for Credit Card Transactions. Processing Tips CARD ONE INTERNATIONAL INC Merchant Processing Tips Ti ps for Credit Card Transactions CARD ONE INTERNATIONAL INC Card One International Inc - Merchant Processing Tips for Card Transactions Page 1 of 11 Merchant Processing Tips

More information

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year.

Deterring Identity Theft. The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Deterring Identity Theft The evolving threats of Identity Theft The Federal Trade Commission estimates that as many as 9 million Americans have their identities stolen each year. Identity theft complaints

More information

Remote Deposit Service Terms and Conditions Personal and Business Accounts

Remote Deposit Service Terms and Conditions Personal and Business Accounts Remote Deposit Service Terms and Conditions Personal and Business Accounts In this Agreement, the words you and your mean the member who enrolls or uses the services described in this Agreement. The words

More information

CR-370 CASH RECEIPTS

CR-370 CASH RECEIPTS CR-370 CASH RECEIPTS 370.1 UNIT DEPOSITING PROCEDURES 370.2 GENERAL INTERNAL POLICIES RELATING TO THE CASHIER 370.3 TIMELY DEPOSITS 370.4 COUNTING THE ENTERPRISE UNIT DEPOSIT 370.5 PREPARING THE BANK DEPOSIT

More information

SPECIFIC TERMS APPLICABLE TO YOUR HIGH YIELD CHECKING ACCOUNT

SPECIFIC TERMS APPLICABLE TO YOUR HIGH YIELD CHECKING ACCOUNT SPECIFIC TERMS APPLICABLE TO YOUR HIGH YIELD CHECKING ACCOUNT Variable Rate information. This account is subject to a Variable Rate. The interest rate and annual percentage yield (APY) may change at any

More information

TROY POLICE DEPARTMENT MERCHANTS GUIDE BAD CHECKS Page 1 of 13

TROY POLICE DEPARTMENT MERCHANTS GUIDE BAD CHECKS Page 1 of 13 Page 1 of 13 Millions of dollars are lost annually through the passing of bad checks in Oakland County. The complaints for such fraudulent transactions now mount in the thousands. The Troy Police Department

More information

Table of Contents. 2 TouchSuite Welcome Kit

Table of Contents. 2 TouchSuite Welcome Kit Welcome Kit Table of Contents Important Account Information... Welcome to TouchSuite Merchant Services... Help Desk Card Enclosed... Your Merchant ID (MID)... 3 3 3 3 Customer Support Numbers... 4 Card

More information

CHAPTER 99-01.3-04 BINGO

CHAPTER 99-01.3-04 BINGO Section 99-01.3-04-01 Bingo 99-01.3-04-02 Equipment 99-01.3-04-03 Conduct and Play 99-01.3-04-04 Cash Register 99-01.3-04-05 Tickets 99-01.3-04-06 Paper Card Count 99-01.3-04-07 Floorworker Sales Report

More information

Mobile Banking and Mobile Deposit Terms & Conditions

Mobile Banking and Mobile Deposit Terms & Conditions Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National

More information

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the

Statement of. Carlos Minetti. Discover Financial Services. Before the. Subcommittee on Oversight and Investigations. of the Statement of Carlos Minetti Discover Financial Services Before the Subcommittee on Oversight and Investigations of the Committee on Financial Services United States House of Representatives July 21, 2005

More information

IDENTITY THEFT PREVENTION (Red Flag) POLICY

IDENTITY THEFT PREVENTION (Red Flag) POLICY IDENTITY THEFT PREVENTION (Red Flag) POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through

More information

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office: 2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT

More information

Fraud Prevention Checklist for Small Businesses

Fraud Prevention Checklist for Small Businesses Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can

More information

Terms and Conditions Mobile Check Deposit

Terms and Conditions Mobile Check Deposit For Mobile Deposits, please: 1. Sign (endorse) your check 2. Under your signature write "For e-deposit only at Market USA" Ex. Joe Member for e-deposit only at Market USA *Please destroy deposited checks

More information

Electronic Funds Transfer Disclosure Agreement

Electronic Funds Transfer Disclosure Agreement Electronic Funds Transfer Disclosure Agreement Your use of any EFT service offered by the Bank will be governed by this Disclosure and by any separate agreement or disclosure that also applies to the EFT

More information

Eagle POS Procedure Guide For Epicor Bankcard Processing

Eagle POS Procedure Guide For Epicor Bankcard Processing Eagle POS Procedure Guide For Epicor Bankcard Processing Table of Contents Introduction... 3 1 Transactions using a Swiped Bankcard... 3 Basic Swiped Credit Card Sale & Return transaction... 3 Sales &

More information

CREDIT CARD. Our terms and conditions for. Your credit card

CREDIT CARD. Our terms and conditions for. Your credit card CREDIT CARD Our terms and conditions for Your credit card 1 Introduction and Definitions 1.1 Scope These Terms and Conditions are a contract between you and BNZ. They apply to the use of your Card, including

More information

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions

TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS. Mary Olson, Senior Marketing Manager, Citizen Solutions TAKING A HOLISTIC APPROACH BEST PRACTICES FOR OVER-THE-COUNTER GOVERNMENT ID CARD PROGRAMS Mary Olson, Senior Marketing Manager, Citizen Solutions INTRODUCTION Government organizations are regularly challenged

More information

Fraud Minimisation Guide ANZ Merchant Business Solutions

Fraud Minimisation Guide ANZ Merchant Business Solutions Fraud Minimisation Guide ANZ Merchant Business Solutions INTRODUCTION Fraud can occur in and is a risk for any business that accepts credit cards and it can have a significant financial impact on your

More information

Mobile Deposit Disclosure

Mobile Deposit Disclosure Mobile Deposit Disclosure After you login to Mobile Banking, you may apply for Mobile Remote Deposit. With this service, you may deposit funds in your Mobile Account by capturing checks through a mobile

More information

Red Flag Identity Theft Financial Policy 1.10

Red Flag Identity Theft Financial Policy 1.10 Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements

More information

A Performance Audit of the State s Purchasing Card Program

A Performance Audit of the State s Purchasing Card Program REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan

More information

A Guide to Benedictine College and Identity Theft

A Guide to Benedictine College and Identity Theft IDENTITY THEFT PREVENTION PROGRAM The risk to Benedictine College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through

More information

Google Payments Terms of Service Buyer (US)

Google Payments Terms of Service Buyer (US) Google Payments Terms of Service Buyer (US) September 10, 2015 These Terms of Service are a legal agreement, between you and Google Payment Corp. ("GPC" or "we"), a wholly owned subsidiary of Google Inc.,

More information