Targeting businesses can be much more profitable for fraudsters than personal identity theft.
|
|
- Lee Owen
- 8 years ago
- Views:
Transcription
1 When You Aren t You: Corporate Identity Theft A New Snake in the Grass... (and Check Fraud Still #1.) CorporateIdentity Theft CorporateIdentity Theft is one of the newest financial threats facing businesses and organizations. Presented at 2015 Greg Litster, President SAFEChecks There are two major types of Corporate Identity Theft. In one major type, fraudsters target and imitate a legitimate business. Targeting businesses can be much more profitable for fraudsters than personal identity theft. Dun & Bradstreet has reported cases of corporate identity theft in at least 22 states, and predicts this crime will spread across the country. Corporateidentity theft is the unauthorized use of a company s name and information by criminals in order to illegally obtain money, goods, or services. The Internet has made it easy to create a non-existent business that looks legitimate no organization is immune from the threat of corporate identity theft. Some losses have reached a half-million dollars before the crime was discovered. 1 1
2 When banks or other commercial lenders evaluate a business, they look for evidencethat the company is what its officers say it is, and that it has the legal and financial capacity to conduct its business. Evidence = Proof of Right Proof of Right can include financial statements business addresses telephone numbers government licenses credit history etc. Each Proof of Right that can be verified increases the appearance of a company s legitimacy. Thieves can create fraudulent Proofs of Right by gaining access to state government records of legitimate businesses, and then altering company information, such as the registered agents names and addresses. Criminals open new bank accounts and obtain loans and credit cards in the name of the business, often using the compromised identity of business owners or officers. They use falsified financial statements to even lease offices, furniture and equipment, creating the illusion of a successful business. They use bank loans and retailer lines of credit to purchases items that can readily be sold for cash. Often, this leaves the unwitting victimized business awash in debt and legal fees defending itself against creditors. 2 2
3 Criminals tend to target smaller and midsize businesses with strong credit ratings that are easily identified through credit rating agencies. Business credit reports are intended to promote buying and selling, and help managers make risk assessment decisions, so business credit reports are readily available to virtually anyone. Family businesses, churches, and inactive companies have been targeted. Smaller businesses with strong credit ratings are tempting targets for criminals because they often have fewer legal and financial defenses than large corporations. Real Life Examples. In California: A seafood company received an order for $500,000 worth of goods. After completing a credit check, the company shipped the order and billed the customer. The customer responded that it had never placed nor received the order. It was discovered that the customer's credit information and a different address had been given by a fraudster. In California, identity thieves moved into the same building as a law firm under the firm's own name! and billed the firm for $70,000 worth of computers and furniture. When the products arrived, they hired a moving truck and disappeared. By that time, both the goods and the thief had already vanished. 3 3
4 In Oregon, identity thieves reinstated old mining companies to steal their corporate identity. (Oregon recently established limits on how long a company can be dormant before it is reinstated.) In Colorado: Criminals updated or altered the registration information on file with the state. After the registration information was changed, the criminals used the altered corporate identity to make online applications for credit from various retailers, including Home Depot, Office Depot, Apple and Dell. Colorado authorities became aware of the scam after one of the targeted companies was contacted by a major retailer regarding nearly $250,000 in purchases made in its name. In Colorado: A small business owner learned of his company s identity theft when he contacted Dun & Bradstreet to ensure an address change was recorded properly. That's when he learned of a new registered agent and address -an Aurora mail drop that was set up to forward everything to California. The thieves also had changed key information about his company on Dun & Bradstreet's database, such as increasing the number of his employees from 15 to 150 and his company's annual revenues by a factor of 10! In Florida: An aviation company had been dissolved by the owners. It was then reinstated by corporate identity thieves. Soon after, they applied for a $140,000 federal fuel tax credit, which was delivered as a check. The scammers and the money disappeared and the previous owners only learned about it when the IRS came knocking on their door." Solutions to this type of Corporate Identity Theft. Many state governments are actively working to help better protect government controlled and regulated business data. 4 4
5 The biggest challenge is alerting and educating organizations about this new type of crime, and motivating them actively self-monitor. Defensive strategies include using better passwords, dual-authentication controls, and checking business legal filings regularly. Organizations should protect their business EIN / TIN as they would a Social Security number. Businesses should verifyatypical large purchases and change of shipping address from current clients. Businesses should verifyunusual large purchases from new clients. Keep all documents containing business information or business identifiers in a secure place that is not accessible by unauthorized persons. Shred them when discarded. Use caution when completing a credit application. Criminals post fake credit applications, and after a legitimate company has filled it out, the criminals have all the information they need to defraud the business, or obtain loans or lines of credit in the business' name. Review your commercial and business banking agreements understand the time frames for reporting fraud, anomalies, etc. Monitor your business accounts daily. Many banks provide and text alerts regarding your account activity, which can help alert you to suspicious transactions. 5 5
6 If your business provides or maintains a list of trade or credit references, request each reference to notify you if they are contacted by a third party. If you are not applying or planning to apply for new credit, you can place a security freeze on your personal credit to prevent businesses with whom you do not already have an existing relationship from accessing your credit file. Training!! Protecting your business, and the sensitive information of your business, your customers, and employees is the responsibility of everyone in your organization. In the second major category of Corporate Identity Theft, criminals target an organization s clients or vendors through Corporate Hacking. Hackers target Accounts Receivable List Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers Hackers target Accounts Receivable List Send bogus change-of-bank notifications to customers New PO Box controlled by hackers New Bank R/T and account controlled by hackers Solutions to this type of Corporate Identity Theft. 6 6
7 Banks: Monitor bank changes on outgoing repetitive wires Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Banks: Monitor bank changes on outgoing repetitive wires Companies: Confirm ALL bank change notifications from vendors Buy cyber crime and check fraud insurance Use payee positive pay and high security checks RESOURCES: businessidtheft.org Dun & Bradstreet Bloomberg BusinessWeek, The Council of State Governments Also, review information and resources offered by your state and local government. Check Fraud Why talk about Check Fraud? Check Fraud Produces more $ Losses than all other types of payment fraud! AFP 2015 Payments Fraud Survey 50%of organizations still issue checks. Check fraud is not going away! AFP 2015 Payments Fraud Survey Checks remain the most-often targeted payment method by those committing fraud attacks. Check fraud also accounts for the largest dollar amount of financial loss due to fraud. 7 7
8 Fraudulent Payments by Method (Respondents were hit multiple ways; total > 100%) Fraud Losses by Method How Dollars were actually lost CHECKS 77% Corporate Cards 34% Wire Tranfers 27% CHECKS 45% Corporate Credit Cards 25% Wire Transfers 20% ACH Debits 7% 40 ACH Debits 25% 40 Corporate 20 ACH Credits 10% 20 Debit Cards 2% The newest twists on Check Fraud. ACH Credits 1% 0 Percentage 0 Percentage Mobile Banking and Deposit Fraud: Double Debits Mobile Banking Deposit Fraud Scenario: A check is mailed to Dishonest Don Don deposits the check using smart phone app Digitized check is paid at drawer s bank 10 days later, Don cashes the same check at a check cashing store 2 nd check hits the drawer s bank account (check is presented for payment twice) Who Takes The Loss? The answer is found in the Rules governing Check 21 Under the Warranty Liability for the loss falls to the bankthat allowed its customer to use its smart phone app. Bank can charge the loss against its customer (assuming $$ is still there) Mobile Banking and Deposit Fraud: Holder in Due Course Scenario: A title insurance company gives John Doe a check at closing. John Doe deposits the check via a mobile app, then comes back to office and returns the check, asking that it be made payable to John Doe orjane Doe. 8 8
9 The company doesn t think to place a Stop Payment on the first check because they have the check in hand. 1. If a physical check is returned for a replacement, place a stop paymenton the returned check. It may have been deposited remotely. 2. Recipient MUST sign an affidavitstating the check was not deposited. 3. An Affidavit does not provide protection, only a right to sue and collect legal fees. Strategies to Prevent Check Fraud Don t Write Checks! Use Commercial Purchase Cards Pay electronically (ACH) But, if you are going to write checks #1. Positive Pay Positive Pay......a powerful tool! PositivePay.net #2. High Security Checks Effective check fraud prevention strategies begin with a high security check. 9 9
10 High Security Checks 1. Deter the forger(psychological warfare) 2.Thwart forgers attempts to replicateor alter the check 3.Provide legal protection from some Holder in Due Course claims (UCC 3-302) What makes a check secure? 10+ safety features Important Security Features Controlled Check Stock Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines Controlled Check Stock Is a critical security feature Checks should beunique in some wayto every other organization s check stock No two organizations should have the exact, identical check stock Uncontrolled Check Stock Checks ARE NOTuniquely designed or customized for every end-user It is sold entirely blankto countless entities, organizations, and fraudsters, by print brokers all over the USA How is Uncontrolled Check Stock a problem? Counterfeit Cashiers Checks Counterfeit Cashiers Checks Counterfeit Cashiers Checks 10 10
11 Counterfeit Cashiers Checks Counterfeit Cashiers Checks Holder in Due Course and Uncontrolled Check Stock Web: FraudTips.net HIDC & Uncontrolled Check Stock Robert Triffinv. Somerset Valley Bank and Hauser Contracting Company Obtaining Controlled Check Stock 1. Custom-manufacturechecks using an ORIGINAL design, true-watermarked paper, and at least 10 security features, OR 2. Buy from a supplierthat only sells controlled check stock that has never been replicated or used in a check fraud scam. SAFEChecks.com Other Important Security Features Dual-tone True Watermark Thermochromatic Ink (reacts to heat) Warning Bands worded correctly Toner Anchorage Copy Void Pantograph Chemical-reactive Ink + Paper Inventory Control Number on Back (laser) UV Ink + UV Fibers Microprinting Laid Lines HIDC & High Security Checks Robert Triffin v. Pomerantz Staffing Services AFP 2014 Payments Fraud Survey Check Fraud Methods Alterations: 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% This is up from 49% and 22% respectively, in the 2013 Survey. AFP 2014 Payments Fraud Survey Most of these alterations could have been prevented with check security features! 1. Payee Name Alterations = 52% 2. Dollar Amount Alterations = 37% 11 11
12 Preventing Altered Payees High-security checks 14 point font for Payee Name High-quality toner Hot laser printer Payee Positive Pay Frank Abagnale s s Fraud Bulletin on Laser Check Printing Positive Pay Provides NO PROTECTION Against Added Payee Names! #3. Secure Check Writing Software To Prevent Added Payees Typical Check Layout Fix it:use a Secure Name Font Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Leaves No Room for Adding Bogus Payee Secure Name Font printed above original payee name helps eliminate Added Payee Name Risk Open Areas Where Forgers Add A New Payee Name Secure Name Font No room for an Added Payee Identical data is printed on both checks. Which check would forgers prefer to attack? Greg Litster, President SAFEChecks (800) 949-BANK (818) cell greg@safechecks.com GLITSTER@aol.com # # # # 12 12
HOLDER IN DUE COURSE and CHECK FRAUD
HOLDER IN DUE COURSE and CHECK FRAUD Frank Abagnale President, Abagnale and Associates www.abagnale.com Greg Litster President, SAFEChecks Canoga Park, CA (800) 949-2265 greg@safechecks.com Every company
More informationThe New Faces of Fraud. and. and. How to Thwart Them. Mobile Banking and Deposit Fraud. Mobile Banking/Deposit Fraud: Slides #3 6
The New Faces of Fraud and How to Thwart Them Presented at By Greg Litster, SAFEChecks Mobile Banking/Deposit Fraud: Slides #3 6 Check Fraud and Payment Fraud: Slides #7 91 Cyber Crime: Slides #92 end
More informationCHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation
CHECK 21, REMOTE DEPOSIT CAPTURE and CHECK FRAUD: Summary and Detailed Explanation Check 21, Remote Deposit Capture and Check Fraud.in Layman s Terms Check 21 s Final Rule includes an Indemnity provision
More informationCAPITAL PERSPECTIVES DECEMBER 2012
CAPITAL PERSPECTIVES DECEMBER 2012 MITIGATING PAYMENT FRAUD RISK: IT S A WAR ON TWO FRONTS Payment fraud continues to be one of the biggest risk management challenges facing corporate treasury managers
More informationBusiness Identity Fraud Prevention Checklist
Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business
More informationThe FRAUD Bulletin. Volume 14. ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime.
The FRAUD Bulletin ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime Inside this Issue Volume 14 1 Check Fraud It s Still #1 2 Fraud Goes Mobile 3 Cyber
More informationThe Fraud Bulletin. Volume 11. Mobile Banking Fraud Cyber Crime Embezzlement Identity Theft Check Fraud Holder In Due Course.
The Fraud Bulletin Volume 11 Mobile Banking Fraud Cyber Crime Embezzlement Identity Theft Check Fraud Holder In Due Course Inside this Issue 1 Check Fraud Our Greatest Threat 2 Preventing Embezzlement
More informationCybercrime, Mobile Banking Fraud, Check Fraud, Embezzlement. Greg Litster SAFEChecks (800) 949-2265 GLITSTER@aol.com greg@safechecks.
Cybercrime, Mobile Banking Fraud, Check Fraud, Embezzlement Greg Litster SAFEChecks (800) 949-2265 GLITSTER@aol.com greg@safechecks.com Smartphones and Tablets Criminals are targeting smartphones and tablets
More informationIdentity Theft. Protecting Your Credit Identity 1.3.1.G1
Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity
More informationIDENTITY THEFT: MINIMIZING YOUR RISK
IDENTITY THEFT: MINIMIZING YOUR RISK What is Identity Theft? Identity theft occurs when someone uses another person s information to commit fraud or other crimes. Information such as your name, Social
More informationIdentity Theft, Fraud & You. Prepare. Protect. Prevent.
Prepare. Protect. Prevent. Identity Theft, Fraud & You Fraud and identity theft incidents claimed fewer victims in 2010 than in previous years. But don t get too comfortable. Average out-of-pocket consumer
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationGUIDE TO PROTECTING YOUR BUSINESS
GUIDE TO PROTECTING YOUR BUSINESS GT44GPBW As a small business owner, fraud is a significant threat to your business. According to a 2012 study by the Association of Certified Fraud Examiners, the smallest
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
More informationBanking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products
Banking Solutions for Nonprofits 101 Four Money Saving Strategies for Nonprofits with Bank Products Understanding Bank Options for Nonprofit Organizations What type of accounts are available for Nonprofits
More informationCHECK FRAUD. Federal Reserve System
CHECK FRAUD Federal Reserve System Check fraud affects every financial institution, every business, and every individual throughout the United States and around the world. Industry sources estimate that
More informationThe Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
More informationCheck Fraud, Identity Theft and Embezzlement
Invest in you SM F R A N K W. A B A G N A L E S Check Fraud, Identity Theft and Embezzlement VOLUME II INSIDE THIS ISSUE Check Fraud A National Epidemic........ 1 Check Fraud Prevention Best Practices....
More informationI know what is identity theft but how do I know if mine has been stolen?
What is identity theft? You might hear stories on the news about stolen identities, but what is identity theft? When someone uses the personal information that identifies you, like your name, credit card
More informationIDENTITY. theft. Identity theft can happen. to anyone. Previously, criminals stole your wallet. for your cash. Now they. want your wallet to
IDENTITY THEFT IDENTITY theft Identity theft can happen to anyone. Previously, criminals stole your wallet for your cash. Now they want your wallet to steal your good name. Protect yourself and your identity.
More informationFraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
More informationBusiness Email Compromise Scam
Business Email Compromise Scam The FBI has issued a warning about a significant spike in victims and dollar losses stemming from an increasingly common scam in which crooks spoof communications from executives
More informationPROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit
PROTECT YOURSELF AND YOUR IDENTITY Chase Identity Theft Tool Kit USE THESE IMPORTANT CONTACTS TO KEEP YOURSELF PROTECTED CHASE CONTACTS Customer Protection Group Credit Cards 1-888-745-0091 Other Account
More informationIDENTITY THEFT FRAUD
FRAUD ALERT! SYNTHETIC IDENTITY THEFT FRAUD & n How to Protect Yourself n Data Breaches and You n Free Credit Reports SYNTHETIC IDENTITY THEFT and FRAUD It is hardly news that identity thieves and cybercriminals
More informationPreventing Identity Theft National City Bank. How to protect your identity
Preventing Identity Theft National City Bank How to protect your identity Understanding and Preventing Identity Theft Identity Theft is the fastest growing crime in America 500,000 people fall victim to
More informationIdentity Theft PROTECT YOUR INFORMATION AND YOUR IDENTITY HIGHLIGHTS
This publication is intended to provide general information only and is not a substitute for legal advice. HIGHLIGHTS 1 PROTECT YOUR INFORMATION AND YOUR IDENTITY 3 BE VIGILANT 3 CORRECTING INFORMATION
More informationIdentity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
More informationCombating Fraud on Corporate Checking Accounts
Combating Fraud on Corporate Checking Accounts A Bank of America White Paper One in a series of white papers prepared by Bank of America on key issues of interest to corporate treasurers. The information
More informationPROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET
PROTECT YOURSELF A CONSUMER PROTECTION PAMPHLET Money Transfer Scams Many scammers ask consumers to send money by wire transfer through companies like Western Union and MoneyGram. If you wire money and
More informationThe FRAUD Bulletin. Volume 12. ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime.
The FRAUD Bulletin ACH Fraud Mobile Fraud Corporate Identity Theft Small Business Fraud Check Fraud Scams Cyber Crime Inside this Issue Volume 12 1 Check Fraud It s Still #1 2 The Mobilization of Fraud
More informationAvoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
More informationClient Education. Learn About Identity Theft
Client Education Learn About Identity Theft 2 What is identity theft? 6 Detecting identity theft 10 Minimizing your risk 14 What to do if you re a victim The Federal Trade Commission (FTC) estimates that
More informationPlastic Fraud. Debit Cards Debit cards, unlike credit cards, automatically withdraw funds from your account at the time you make a transaction.
Getting a Handle on Debit and Credit Cards Plastic Fraud State-of-the-art thieves are concentrating on plastic cards. In the past, this type of fraud was not very common. Today, it is a big business for
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationIdentity Theft: It CAN Happen to You
Aging Well: Healthier, Happier and Less Hassled An Educational Series for Seniors and their Caregivers Identity Theft: It CAN Happen to You How would you feel if you were stopped for a traffic violation
More informationIdentity Protection Guide. The more you know, the better you can protect yourself.
Identity Protection Guide The more you know, the better you can protect yourself. Be Aware According to a 2012 report, identity theft is one of the fastest growing crimes in America 1 and it can have serious
More informationHOME DEPOT DATA BREACH
HOME DEPOT DATA BREACH This notice contains important information about the data breach announced by Home Depot, affecting some debit and credit cards used at Home Depot stores beginning April 2014. Data
More informationJUST BEGINNING. Your financial life is. I m Buying a Car!
Your financial life is JUST BEGINNING. The decisions you make now will put a steering wheel and a credit card in your hands. But they will also affect your financial future. Your choices may even prevent
More informationCorona Police Department
By Detective John Alvarez Corona Police Department High Technology Crimes Unit California Penal Code 530.5(a) defines Identity Theft: Every person who willfully obtains personal identifying information,
More informationPROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT
PROTECT YOURSELF AND YOUR IDENTITY CHASE IDENTITY THEFT TOOL KIT At Chase, we work hard to pro v help prepare you for whatever h Convenient Reference for Important Contacts: Chase Identity Theft Center
More informationDriving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
More informationCORPORATE IDENTITY FRAUD: A PRIMER
CORPORATE IDENTITY FRAUD: A PRIMER Hanim Norza Baba, Head of Graduate Studies Center, Universiti Teknologi MARA, Melaka, Malaysia. drhanimnorzababa@gmail.com ABSTRACT Corporate identity fraud occurs when
More informationIdentity Theft Awareness: Don t Fall Victim to these Common Scams
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationFinancial Safety. Protection so you can focus on what matters most
Financial Safety Protection so you can focus on what matters most Protect yourself against threats in person and online. Keeping you informed about identity theft, online scams, ATM skimmers and other
More informationIdentity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
More informationFor more information, please refer to our Check Armor FAQ: https://www.blackbaud.com/files/pdf/blackbaud forms/checkarmorfaq.pdf
Check fraud is one of the largest challenges facing nonprofits and financial institutions today. With the advancement of computer technology, it is increasingly easy for criminals to manipulate checks
More informationDon t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
More informationCASHIER S CHECKS OTHER OFFICIAL INSTRUMENTS
CASHIER S CHECKS OTHER OFFICIAL INSTRUMENTS Would You Be Deceived? Cashier s checks have long been a trusted method for making a payment. Recently, however, the use of counterfeit cashier s checks and
More informationEmployment Internet Fraud FABRICS4YOU Textiles
FRAUD TIP OF THE WEEK Employment Internet Fraud FABRICS4YOU Textiles A Latvian Textile Company Located in the United Kingdom By Detective Paul Henninger Salem Police Department March 2, 2007 During the
More informationIdentity Theft: Protecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment
More information8/13/2014. Types of Identity Theft HOW IS IDENTITY THEFT DISCOVERED? Identity Theft. Run up existing accounts. Create new accounts.
According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States Increasing an average nearly 40 percent per year for the past several years. The
More informationIdentity Theft: Informational Workshop
Identity Theft: Informational Workshop ~ Prepared By ~ Connecticut Department of Consumer Protection Jerry Farrell, Jr. Commissioner 1 The Department of Consumer Protection Mission The Department of Consumer
More informationOnline Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts
A Guide to Protecting Your Identity and Accounts As part of SunTrust s commitment to protecting your accounts and identity, we ve created the Online Fraud & Identity Theft Guide, which provides information
More informationThis notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen.
RECENT DATA BREACHES This notice contains important information about the data breaches announced by Home Depot, Kmart and Dairy Queen. Data security is a number one priority at Northwest. We take every
More informationTorn Identity: Preventing New Forms of Corporate Identity Theft
Torn Identity: Preventing New Forms of Corporate Identity Theft Bonnie J. Hertz, CTP Cash Manager North Pacific Group, Inc. Greg Hansen VP, Product Management Wells Fargo Bank 1 Agenda Overview of fraud
More informationQuestions and Answers About the Identity Theft Red Flag Requirements
Questions and Answers About the Identity Theft Red Flag Requirements 1. Who is covered by the new Identity Theft Regulations? The Identity Theft Regulations consist of three different sets of requirements,
More informationNCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA DATE: September 2001 LETTER NO.: 01-CU-09 TO: SUBJ: Federally Insured Credit Unions Identity Theft and
More informationIntercepting your mail. They can complete change of address forms and receive mail that s intended for you.
At SunTrust, we re committed to protecting your accounts and identity. That s why we ve created this Identity Theft Guide. This guide provides information about online fraud and identity theft, as well
More informationHSS Visiting Speaker Program Frank W. Abagnale: Fraud and Theft in the Information Age. October 28, 2009
1 of 8 In the United States, the FBI ranks cyber crime and identity theft as the third highest threat, just after terrorism and espionage. In October 2009, the FBI indicted the largest number of defendants
More informationArmstrong State University Fall Staff Assembly. Chief Wayne Willcox, MSCJ, CLEE
Armstrong State University Fall Staff Assembly Chief Wayne Willcox, MSCJ, CLEE Identity Theft: When someone uses your personal information without your permission to commit fraud or other crime Name Social
More informationThe University of North Carolina at Charlotte Identity Theft Prevention Program
The University of North Carolina at Charlotte Identity Theft Prevention Program Program Adoption As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule ( Rule ),
More informationIdentity Theft Grade Level 10-12
Identity Theft Grade Level 10-12 Take Charge of Your Finances Materials provided by: Karen Dawson, Family and Consumer Sciences Educator, Skyview High School, Billings, Montana Time to complete: 75 minutes
More informationIdentity Theft. Officer Rob Romey IPD Crime Prevention Officer. crimeprevention@indepmo.org
Identity Theft Officer Rob Romey IPD Crime Prevention Officer 816-325 325-7643 crimeprevention@indepmo.org What Is Identity Theft? Identity theft occurs when someone possesses or uses your name, address,
More informationWhen Fraud Comes Knocking
When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.
More informationThe Home Depot Provides Update on Breach Investigation
The Home Depot Provides Update on Breach Investigation Breach confirmed Investigation focused on April forward No evidence of debit PIN numbers compromised No customers liable for fraudulent charges Customers
More informationInformation copied from Federal Trade Commission Website (www.ftc.gov)
DETER OR MINIMIZE YOUR RISK OF IDENTITY THEFT Information copied from Federal Trade Commission Website (www.ftc.gov) Protect your Social Security number Don't carry your Social Security card in your wallet
More informationIdentity Theft: Prevention & Survival
Identity Theft: Prevention & Survival Crime of the Century Provide By: Nick Sabetta Don t t Let Someone Steal Your Good Name What is Identity Theft? When someone uses your personal information without
More informationMarket Intelligence Cell. Fighting Financial Crime
Market Intelligence Cell Fighting Financial Crime 1 Market Intelligence Cell Our objective To investigate and suppress illegal, dishonorable and improper practices, market abuse and any potential breach
More informationQuestions and Answers
Consumer Action T r a i n i n g M a n u a l www.consumer-action.org 221 Main Street, Suite 480 San Francisco, CA 94105 415-777-9635 TTY: 415-777-9456 523 W. Sixth Street, Suite 1105 Los Angeles, CA 90014
More informationFraud and Identity Theft. Megan Stearns, Credit Counselor
Fraud and Identity Theft Megan Stearns, Credit Counselor Agenda Fraud and identity theft statistics Fraud Identity theft Identity theft prevention Protecting your Social Security Number Online prevention
More informationProtecting, Monitoring and Resolving
Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. And EmergingWealth Investment
More informationSection 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
More informationIdentity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
More informationCYBERCRIME: What your Bank should be doing to Protect your Business. David Pollino Senior Vice President Fraud Prevention Officer
CYBERCRIME: What your Bank should be doing to Protect your Business David Pollino Senior Vice President Fraud Prevention Officer Agenda Changing Landscape Case of Efficient Services Escrow Group Six key
More information01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)
01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:
More informationT E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E
T E X A S Y O U N G L A W Y E R S A S S O C I A T I O N A N D S T A T E B A R O F T E X A S I D E N T I T Y T H E F T G U I D E A I D E N T I T Y T H E F T G U I D E Prepared and distributed as a Public
More informationUniversity of Nebraska - Lincoln Identity Theft Prevention Program
I. Purpose & Scope This program was developed pursuant to the Federal Trade Commission s (FTC) Red Flag Rules promulgated pursuant to the Fair and Accurate Credit Transactions Act (the FACT Act). The University
More informationWhat You Need to Know About Identity Theft. Identity Theft Prevention Tips
What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another
More informationSOUTH TEXAS COLLEGE. Identity Theft Prevention Program and Guidelines. FTC Red Flags Rule
SOUTH TEXAS COLLEGE Identity Theft Prevention Program and Guidelines FTC Red Flags Rule Issued June 24, 2009 Table of Contents Section Section Description Page # 1 Section 1: Program Background and Purpose
More informationB. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.
Date Revised: Page 1 of 16 5-21 Identity Theft Prevention Program I. BACKGROUND As a result of the increasing instances of identity theft, the United States Congress passed the Fair and Accurate Credit
More informationFrom Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense
1 of 5 11/17/2014 4:14 PM 800.268.2440 From Data Breaches and Information Hacks, to Unsecure Computing - Know Your Defense Share This Every other week it seems like there is another secure data breach
More informationTake our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on
Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on Are you a Target? On-Line Scams Credit/Debit Card Investment Identity Theft Frauds Scams Mark the following
More informationCredit and Debit Card Scams
Credit and Debit Card Scams What is a credit card scam? It happens when someone uses your credit or debit card information without your permission. It may be as complicated as someone posing as a representative
More informationCincinnati Insurance Company v. Wachovia Bank
Cincinnati Insurance Company v. Wachovia Bank Wachovia Bank Wins Lawsuit Over Customer That Refused Positive Pay The Legal Rationale to Implement Positive Pay and High Security Checks Frank W. Abagnale
More informationCustomer Awareness for Security and Fraud Prevention
Customer Awareness for Security and Fraud Prevention Identity theft continues to be a growing problem in our society today. All consumers must manage their personal information wisely and cautiously to
More informationProtecting Yourself from Identity Theft
identity theft unit new york county district attorney s office Protecting Yourself from Identity Theft cyrus r. vance, jr. district attorney 5 / 2010 questions and answers Dear Friends, cyrus r. vance,
More informationAVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
More informationCiti Identity Theft Solutions
Identity Theft what you need to know Citi Identity Theft Solutions At Citi, we want to keep you informed about all of the issues that can affect your financial life. We re bringing you helpful information
More informationHow To Protect Yourself From Identity Theft
Learn about identity theft Investor education Protecting a vital asset: Your identity A 2013 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the
More informationBenefits of LifeLock Ultimate Plus. About LifeLock. 3 Layers of Protection DETECT ALERT RESTORE FACT SHEET LIFELOCK ULTIMATE PLUS
FACT SHEET LIFELOCK ULTIMATE PLUS Your bank accounts and credit are a gold mine for identity thieves. LifeLock Ultimate Plus service gives you some peace of mind knowing you have LifeLock s most comprehensive
More informationIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention National Crime Prevention Council 2005 Objectives What is identity theft? Why worry about it? How does it happen? Why has identity theft emerged? What
More informationACTION PLAN FOR VICTIMS OF IDENTITY THEFT
FOR VICTIMS OF IDENTITY THEFT A program of the Texas Legal Services Center supported by Grant No. 2007-VF-GX-K032 awarded by the Office for Victims of Crime, Office of Justice Programs, U.S. Department
More informationHow To Help Protect Yourself From Identity Theft
How To Help Protect Yourself From Identity Theft January 20, 2015 Bryan Strong Senior Vice President and Director Information Security This complimentary interactive webinar is sponsored by Zions Bank
More informationTHINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
More informationChapter 9-Section 3. Consumer Protection Laws
Chapter 9-Section 3 Consumer Protection Laws Fair Credit Reporting Act Grants you the right to know what is in your credit file Gives you the ability to see who has seen your file Right to view credit
More informationFraud Prevention Guide
Fraud Prevention Guide Table of Contents Protect your Information 2 Protect your wallet or purse 3 Don t forget around the house 3 Secure your credit cards and debit cards 4 Stop the telemarketing calls
More informationI dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More information