FraudNet Alert Guide
|
|
- Angelica Fisher
- 8 years ago
- Views:
Transcription
1 FraudNet Alert Guide Use this guide to understand, prioritize, and respond to FraudNet alerts you receive from the SettleMINT EFT team. FraudNet can help protect your credit union and your members from potentially devastating loss. 1
2 What Is FraudNet? Credit unions using EasyPay powered by Fiserv can now enjoy the benefits of FraudNet, a cuttingedge fraud-detection system that identifies fraudulent bill pay activity in real time using a complex set of algorithms. This state-of-the-art fraud-detection tool also helps credit unions meet FFIEC requirements to monitor suspicious activity on high-risk accounts. What Is a FraudNet Alert? FraudNet harnesses the power of collaboration by offering users the ability to post instant alerts and maintain a black list shared and viewable by financial institutions across the nation. When the SettleMINT EFT team receives a FraudNet alert that pertains to a transaction relating to one of your members, they will use AnswerBook to pass this alert on to your credit union s FraudNet contact, who will then need to use the Alert Priority Chart (referenced below) to prioritize the alert in case there are others that also need to be researched. Once the alert is prioritized, your credit union s FraudNet contact will then need to research the transaction referenced in the alert to determine whether or not it is fraudulent (research tips provided on Page 5). Once the legitimacy of the transaction has been determined, your FraudNet contact will need to reply through AnswerBook to request that the transaction be processed or stopped/returned. Alert Priority Chart Use this chart to help you prioritize the FraudNet alerts you receive from the SettleMINT EFT team so you know which transactions to research first in order to determine whether or not they are fraudulent. (Research tips are provided on Page 5.) Alert Timeline If there is an alert that requires your attention, the SettleMINT EFT team will notify you via AnswerBook during one of the two time periods listed below. Also listed below is the time at which they ll need your response on whether or not to process the transaction referenced in the alert. Between 8-9 AM ET (Respond by 2 PM ET same day.) Between 2-3 PM ET (Respond by 8 AM ET next day.) Note: Cases will not be worked on weekends and holidays. It is extremely important that you respond to the SettleMINT EFT team via AnswerBook by the times listed above as we cannot make the decision on your behalf regarding whether to process or stop the transaction. If we do not hear from you with a decision by the times indicated above, then: The payment will remain on hold for up to 5 business days. After that, the payment will be cancelled, in which case the payment would not be delivered and the member could receive late fees/penalties. FIRST PRIORITY Alert Type Negative List DDA (NLD) Alert Type Description The subscriber s bank account number is on a list of bank accounts associated with confirmed cases of fraud. 2
3 Negative List (NLE) Negative List Payee Account # (NLP) Negative List SSN (NLS) Negative List ZIP + 11 (NLZ) Manual Alert (MA) Manual Alert Search (MAS) Quick Hitter Rule (QH) The subscriber s address is on a list of addresses associated with confirmed cases of fraud. The subscriber s account number with the payee is on a list of payee account numbers associated with confirmed cases of fraud. The subscriber s Social Security Number is on a list of Social Security Numbers associated with confirmed cases of fraud. When a Social Security Number is added, all payments made by that subscriber are alerted in FraudNet. Prior to adding a Social Security Number to the Negative List, you must obtain a Declaration of Fraud, which is a letter stating that the subscriber never has and never will use bill pay. The payee s 11-digit ZIP code is on a list of payee address zip codes linked to confirmed cases of fraud. This is externally reported fraud that FraudNet missed or that failed to trigger an alert. It s generated by the sponsor to notify Fiserv of the missed data. It is crucial that these accounts be entered into the FraudNet system so fraud analysts can track and modify client-scoring parameters in the event their detection statistics begin to drop. A sponsor using FraudNet generated an alert for an item that was linked to confirmed fraud data (generally associated with address, ZIP code, or payee account number). Multiple payments have been made to a newly added payee. SECOND PRIORITY Alert Type Subscriber Info Change (ACHG) Personal Payments Receiver Velocity (PPRV) Personal Payment Sender Velocity (PPSV) Alert Type Description The subscriber s address has recently changed. This measures velocity of transactions and cumulative dollar amounts received by an individual. Sponsors subscribing to ZashPay should work with their fraud specialist to establish the appropriate velocity and amount thresholds. This measures velocity of transactions and cumulative dollar amounts sent by an individual. Sponsors subscribing to ZashPay should work with their fraud specialist to establish the appropriate velocity and amount thresholds. 3
4 A2A Velocity (VELTRAN) Account Transfers Sleep (A2AS) Bust-Out (BUST) Bust-Out II (BUS2) Model (MODEL) This monitors the velocity of account-to-account transfers being made by a specific subscriber. Variables are dependent on the specific business unit s needs. This monitors for previously created transactions being scheduled on a previously dormant account. The subscriber is attempting to make a payment to a recently added payee, and the payee s address is located near the subscriber s address. The subscriber is attempting to make a payment to a recently added payee, and the payee s address is located far from the subscriber s address. This is a statistical rule that is usually triggered by payment size. This is usually a large payment with a small chance of fraud. THIRD PRIORITY Alert Type DDA = Payee Account # (EKITE/PKITE) MOE (Merchant Online Enrollment) (MOE) Managed Velocity Payment (MVP) Transfer Monitor (TRAN) Bank by Mail (BBMS) Alert Type Description This monitors for transactions where the funding account matches the receiving or payee account number. This rule monitors both electronic and paper transactions. This rule monitors all newly established MOE merchant payments in the Fiserv system. Verify the payment with the subscriber. MOE was a process created at Fiserv that allowed unmanaged, non-common payees to become electronically enabled. This program is no longer being used, but fraud mitigation practices still exist to monitor MOE merchants who are still electronically enabled within the Fiserv bill payment network. This is an optional rule used to monitor velocity of payments within a particular industry or set of industries. Contact your assigned fraud specialist to establish the thresholds for this velocity rule. For example, this rule helps detect multiple payments being transmitted to various credit card numbers, not just the same number. This monitors newly created account-to-account transfers, timeframes, and amount thresholds per business unit specifications. This monitors transactions being remitted directly to financialinstitution branches for deposit into a checking account. Effective fall
5 Alert Research Tips The tips below are guidelines for researching a transaction flagged in a FraudNet alert. Please note that these are just recommendations and there may be additional research required to determine whether or not a transaction is fraudulent. When researching or making a decision on a transaction referenced in a FraudNet alert, please follow your credit union s fraud/identity theft procedures. 1. Evaluate the transaction against normal member activity for the past three months. Why? If the transaction is out of the member s norms, this could be a sign of fraud. How? From Member Inquiry, click the Transaction Activity button. 2. Review the open date of the membership or sub-account. Why? If the membership/sub-account was recently opened or if it was opened a long time ago with no activity until recently, this could be a sign of fraud. How? Within Member Inquiry, the membership open date will be listed in the top right corner of the Contact Information tab. The sub-account open date will be listed in the top right corner of the Member Account Inquiry screen, accessed by clicking the sub-account and then Select. 3. Review documents used at account opening (i.e. copy of driver s license). Why? If the member s ID looks fake or suspicious, this could be a sign of fraud. How? Follow your specific credit union procedures for where these documents are stored. 4. Review the member s credit report. Why? If the credit score has suddenly plunged, this could be a sign of fraud. How? From MNLOAN #1-Process Member Applications, enter the account base and press Enter. Then type in action code VC and press Enter. Select the report and click View Report. 5. Review any changes in contact information and by whom the changes were made. Why? Identity thieves often change contact information to reroute mail to themselves. How? Go to MNAUDT #24-Audit File Maintenance. 6. If, after performing the above research, you determine it s likely that the transaction is fraudulent, contact the member to verify the legitimacy of the transaction. Tip: Use any previous contact information that may exist for the member to reduce the chances of contacting the identity thief. X If you determine that the transaction is legitimate and you want the SettleMINT EFT team to proceed with the transaction, reply via AnswerBook with instructions to process the transaction. If you determine that the transaction is fraudulent and you want the SettleMINT EFT team to deny the transaction, reply via AnswerBook with instructions to stop/return the transaction. For response deadlines, refer to timeline on Page 2. 5
6 A Closer Look at FraudNet How the FraudNet Software Detects Fraud The FraudNet Detection Engine identifies unusual bill pay activity by gathering the following types of data from payments scheduled through bill pay: Behavioral data: Predefined rules are used to target specific types of behaviors that have been associated with previous fraud. Each rule is assigned a code to help the investigator determine why an alert was triggered and how the investigation should be approached. Negative data: Extracted from confirmed fraud cases, this data is used to detect repeat occurrences of fraud. Statistical data: This data permits FraudNet to detect and return more negative alerts. Common Types of Fraud Detected by FraudNet The definitions below are provided to help you better understand common types of fraud detected by the FraudNet Detection Engine. Electronic kiting: The perpetrator uses a funding account with limited or no funds to process payments via bill pay. Man in the browser: Related to man in the middle, described below, his is a Trojan horse that infects a web browser and has the ability to modify pages, change transaction content, or insert additional transactions, all in a completely covert fashion invisible to both the consumer and the host application. These types of attacks can be successful whether or not security mechanisms such as SSL/PLI and/or multi-factor authentication solutions are in place. The only way to counter these types of attacks is to use transaction verification. Man in the middle: The perpetrator funnels communication between a consumer and a legitimate organization through a fake website. In these attacks, neither the consumer nor the organization is aware that the communication is being illegally monitored. The criminal is in the middle of a transaction between the consumer and his or her bank, credit card company, or retailer. Phishing: This is the practice of luring unsuspecting Internet users to a fake website by using authentic-looking with the real organization s logo in an attempt to steal passwords and financial or personal information, or to introduce a virus attack. Third-party receiver of funds: A person who transfers money and reships high-value goods that have been fraudulently obtained in one country, usually via the Internet, to another country, typically where the perpetrator lives. Trojan horse: A program that installs malicious software (malware) on a consumer s computer without their knowledge. Trojan horses often come in links or as attachments from unknown senders. Once installed, the malicious software can detect the consumer s access to online banking sites and record their username and password, which is then transmitted to the perpetrator. 6
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover
Sound Business Practices for Businesses to Mitigate Corporate Account Takeover This white paper provides sound business practices for companies to implement to safeguard against Corporate Account Takeover.
More informationRetail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
More informationFraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank
Fraud Detection and Prevention Timothy P. Minahan Vice President Government Banking TD Bank Prevention vs. Detection Prevention controls are designed to keep fraud from occurring Detection controls are
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationACH AND WIRE FRAUD LOSSES
ACH AND WIRE FRAUD LOSSES Financial Institution Technology Funnel Matthew G. Brenner Date: September 26, 2013 Orlando, Florida www.lowndes-law.com What We Will Cover Why is this important? Who does this
More informationWith the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
More informationWHITE PAPER Moving Beyond the FFIEC Guidelines
WHITE PAPER Moving Beyond the FFIEC Guidelines How Device Reputation Offers Protection Against Future Security Threats Table of Contents Introduction 1 The FFIEC Guidelines 2 Why Move Beyond Complex Device
More informationCU*BASE AND THE FFIEC SUPPLEMENT TO AUTHENTICATION IN AN INTERNET BANKING ENVIRONMENT
August 5, 2015 CU*BASE AND THE FFIEC SUPPLEMENT TO AUTHENTICATION IN AN INTERNET BANKING ENVIRONMENT Your Guide to Compliance LEGAL DISCLAIMER The information contained in this document does not constitute
More informationINTERNET BANKING SYSTEM AGREEMENT
INTERNET BANKING SYSTEM AGREEMENT Agreement - This Agreement, which includes the Fee Schedule and Enrollment Form, is a contract which establishes the rules which cover your electronic access to your accounts
More informationOnline Banking Risks efraud: Hands off my Account!
Online Banking Risks efraud: Hands off my Account! 1 Assault on Authentication Online Banking Fraud Significant increase in account compromises via online banking systems Business accounts are primary
More informationFirst Federal Bank Online Banking Terms and Conditions Agreement Online Banking Service Business Online Banking Service Bill Payment Mobile Banking
First Federal Bank Online Banking Terms and Conditions Agreement Online Banking Service Business Online Banking Service Bill Payment Mobile Banking First Federal Bank s Online Banking is available to all
More informationAccount-to-Account Transfer Services Risk
Account-to-Account Transfer Services Risk This white paper is part of the Risk Management White Paper Series, which CUNA Mutual Group provides exclusively to its Bond policyholders. TABLE OF CONTENTS Table
More informationIdentity Protection Services
Identity Protection Services Overview Why are identity protection services being provided? We believe your personal information should stay that way personal. That s why we re taking industry- leading
More informationONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
More informationTexas A&M International University Identity Theft Prevention Program
Texas A&M International University Identity Theft Prevention Program 1 I. PROGRAM ADOPTION Texas A&M International University ( University ) developed this Identity Theft Prevention Program ( Program )
More informationCyber Security. Securing Your Mobile and Online Banking Transactions
Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet
More informationCatch the Hometown Spirit
Catch the Hometown Spirit A quick and easy guide to Business Online Banking By Paul A. Murphy, Author of Online Banking for Dummies Published by Murphy & Company, Inc. 60 Barrett Office Dr. St. Louis,
More informationA Quick and Easy Guide to Business Online Banking. By Paul A. Murphy
A Quick and Easy Guide to Business Online Banking By Paul A. Murphy A Quick and Easy Guide to Business Online Banking Welcome Welcome! Whether you re at home, at work or on the road, we are here for you
More informationMember FAQ. General Information: Security:
General Information: Security: Why did you change Robins Federal Online Banking? Great question! We listened to an overwhelming response from you, our members that we needed to make these changes. We are
More informationPersonal Online Banking & Bill Pay. Guide to Getting Started
Personal Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Online Banking. Whether you re at home,
More informationBoiling Springs Savings Bank Online Banking Access Agreement
Boiling Springs Savings Bank Online Banking Access Agreement I. Introduction II. Accessing Your Boiling Springs Savings Bank Accounts through Online Banking A. Requirements B. Electronic Mail (E-mail)
More informationA Quick and Easy Guide to Consumer Online Banking and Bill Pay
upbnk.com Have a question? Contact us at 800.905.775. A Quick and Easy Guide to Consumer Online Banking and Bill Pay Welcome Published by Murphy & Company, Inc. 60 Barrett Office Drive Suite 06 St. Louis,
More informationEmail Expanded Header: Viewing in Microsoft Outlook
Email Expanded Header: Viewing in Microsoft Outlook Figure 1: Default Shown Header in an Outlook 2003 E-mail Message The Internet header of an e-mail message can have twenty lines or more showing all kinds
More informationAvoid completing forms in email messages that ask for personal financial information.
INTERNET FRAUD Online scams and viruses are constantly evolving and they threaten the security of computers worldwide. As criminals evolve their tactics, you need to keep your PC's security software (virus
More informationSpotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
More informationCommercial Online Banking Frequently Asked Questions Bryn Mawr Trust Company
Commercial Online Banking Frequently Asked Questions Bryn Mawr Trust Company Bryn Mawr Trust Company August 2015 Page 1 of 9 CONTENTS Contents... 2 IMPORTANT NEWS!... 3 Fees and Enrollment... 3 Q&A: Commercial
More informationCity of Lathrop, California - Red Flags and Preventing Identity Theft
City of Lathrop, California Finance Department-Utility Billing Identity Theft Prevention Program This program is in response to and in compliance with the Fair and Accurate Credit Transaction (FACT) Act
More informationLearn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
More informationPROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
More informationOnline Banking Customer Awareness and Education Program
Online Banking Customer Awareness and Education Program Electronic Fund Transfers: Your Rights and Responsibilities (Regulation E Disclosure) Indicated below are types of Electronic Fund Transfers we are
More informationSecurity Guidelines and Best Practices for Internet Banking for Precision and Cash Management for Precision. Best Practices Guide
Best Practices Guide Security Guidelines and Best Practices for Internet Banking for Precision and Cash Management for Precision Evolving security threats require the use of evolving controls and methods
More informationMobile Banking User Guide 2015
Mobile Banking User Guide 2015 Page 1 Page 2 Mobile Banking Overview Mobile Banking enables anyone with an online banking account to access their account information from a mobile device. Mobile Banking
More informationCentral Oregon Community College. Identity Theft Prevention Program
Central Oregon Community College Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION This program has been created to put COCC in compliance with Section 41.90 under the
More informationProtecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
More informationIdentification of Red Flags, Detecting Red Flags, and Preventing and Mitigating Identity Theft
George Mason University Identity Theft Prevention Program - Procedures Revised September 30, 2012 Identification of, ing, and Preventing and Mitigating Identity Theft IDENTIFICATION OF COVERED ACCOUNT
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. What is Identity
More informationBusiness Online Banking & Bill Pay Guide to Getting Started
Business Online Banking & Bill Pay Guide to Getting Started What s Inside Contents Security at Vectra Bank... 4 Getting Started Online... 5 Welcome to Vectra Bank Business Online Banking. Whether you re
More informationInformation Security Field Guide to Identifying Phishing and Scams
Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting
More informationPublished by Murphy & Company, Inc. 13610 Barrett Office Drive Suite 206 St. Louis, MO 63021 www.mcompany.com
Published by Murphy & Company, Inc. 13610 Barrett Office Drive Suite 206 St. Louis, MO 63021 www.mcompany.com 2009-2013 Murphy & Company, Inc. Microsoft, Microsoft Money, Windows and Internet Explorer
More informationSecurity Guidelines and Best Practices for Retail Online and Business Online
Best Practices Guide Security Guidelines and Best Practices for Retail Online and Business Online Evolving security threats require the use of evolving controls and methods to protect all transaction activity
More informationWhat You Need to Know About Identity Theft. Identity Theft Prevention Tips
What You Need to Know About Identity Theft Identity theft is the fastest growing crime in America. Criminals who gain access to simply a few pieces of valid personal information can impersonate another
More informationHow do I contact someone if my question is not answered in this FAQ?
Help Where may I find the answers to my Internet Banking questions? How do I contact someone if my question is not answered in this FAQ? Enrolling How do I enroll in Internet Banking? Logging In How do
More informationTips for Banking Online Safely
If proper attention is given to safety and security, banking and monetary activities can be completed online in a convenient and effective fashion. This guide helps to establish procedures for remaining
More information1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
More informationDON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
More informationBusiness Identity Fraud Prevention Checklist
Business Identity Fraud Prevention Checklist 9 Critical Things Every Business Owner Should Do Business identity thieves and fraudsters are clever and determined, and can quickly take advantage of business
More informationOnline Bill Pay Application
Online Bill Pay Application Applicant Name: Social Security#: Date of Birth: Co-Applicant Name: (If both Account Holders want access to Online Bill Pay) Social Security# Date of Birth: Bill Pay Account
More informationRemote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
More informationFRAUD ALERT THESE SCAMS CAN COST YOU MONEY
FRAUD ALERT THESE SCAMS CAN COST YOU MONEY Phishing spear phishing vishing smishing debit card skimming fake check scams THE COMMON SENSE PRECAUTIONS INSIDE CAN KEEP YOU SAFE! SCHEMES SCAMS FRAUDS Criminals
More informationFlorida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
More informationON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12
ON-LINE BANKING, BILL PAYER and MOBILE BANKING Terms and Conditions Effective 5/14/12 By proceeding, you acknowledge that you have already read and agreed to the Online Banking agreement and disclosures.
More informationWhat is Identity Theft?
What is Identity Theft? Identity theft is a crime in which someone obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.
More informationsuntrust.com 800.SUNTRUST
suntrust.com 800.SUNTRUST SunTrust Bank is an Equal Housing Lender. Member FDIC. 2010 SunTrust Banks, Inc., SunTrust, Live Solid. Bank Solid., SunTrust Rewards, and Signature Advantage Checking, are federally
More informationHow To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
More informationTexas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
More informationIdentity Theft Protection
Identity Theft Protection Email Home EDUCATION on DANGER ZONES Internet Payments Telephone ID theft occurs when someone uses your personal information with out your knowledge to commit fraud. Some terms
More information21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
More informationPROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
More informationBasic ebusiness Banking User Guide
Basic ebusiness Banking User Guide 1 Welcome: Welcome to Chemical Bank s ebusiness Banking system. With ebusiness Banking, you can access your accounts 24-hours a day, seven days a week; anywhere an Internet
More informationHometown Bank. OneClick Agreement and Disclosure
Hometown Bank OneClick Agreement and Disclosure Effective Date: August 26, 2014 Scope This Agreement between you and Hometown Bank governs your use of our OneClick bill paying service (OneClick) or (the
More informationPower Against Identity Theft
Power Against Identity Theft What is Your Identity Theft Probability Score? 1. I pay bills with checks and place them in my mailbox or in a corner postal box. 2. I do not use direct deposit or electronic
More informationWhen visiting online banking's sign-on page, your browser establishes a secure session with our server.
The privacy of communications between you (your browser) and our servers is ensured via encryption. Encryption scrambles messages exchanged between your browser and our online banking server. How Encryption
More information/ 1. Online Banking User Guide SouthStateBank.com / (800) 277-2175
/ 1 Online Banking User Guide SouthStateBank.com / (800) 277-2175 Welcome Thank you for using South State s Online Banking. Whether you are a first time user or an existing user, this guide will walk you
More informationCity of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, 2009. Effective Date: Last Revised Date: Responsible Office:
2009 1 City of Geneva Policy Number: Effective Date: Last Revised Date: Responsible Office: 1.0 April 28, 2009 April 27, 2009 Tammy Shuttleworth Status: Draft Under Review Approved Obsolete IDENTITY THEFT
More informationMOBILE BANKING. Why should I use Mobile Banking?
MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data
More informationGeneral tips for increasing the security of using First Investment Bank's internet banking
General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security
More informationIntegrity We are above reproach in everything we do.
Identity Theft Protection Program Compliance with FTC Red Flags Rule Approved by AHC Organizational Committee on: May 26 th, 2009 Electronic Copy Available on AHC s OIP Web Site Integrity We are above
More informationhttp://www.bankonline.com/checking PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston
http://www.bankonline.com/checking http://www.bankonline.com/checking http://www.bankonline.com/checking PHISHING & PHARMING Helping Consumers Avoid Internet Fraud Federal Reserve Bank of Boston http://www.bankonline.com
More informationHow To Use A Credit Union Online Banking On A Credit Card (For A Creditcard)
Federally Insured by NCUA A Quick and Easy Guide to Online Banking & Bill Pay III Welcome A Quick and Easy Guide to A+ Online Banking Welcome! Whether you re at home, at work or on the road, we are here
More informationBusiness ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
More informationIdentity Theft Awareness: Don t Fall Victim to these Common Scams
Identity Theft Awareness: Don t Fall Victim to these Common Scams We want you to understand what identity theft is, how it happens, and how to protect yourself. Please read and familiarize yourself with
More informationOnline Bill Payment & Presentment User Guide
Table of Contents Alerts and Notifications... 4 Add an email Notification...4 Cancel an email Notification...5 Automatic Payments... 6 Add a Standard Automatic Payment Rule...6 Add an Automatic Payment
More informationOnline Banking Application
Online Banking Application In this Agreement the words you and your mean each person who signs this Application. The words we, us and our mean ALABAMA TEACHERS CREDIT UNION. The word PIN means your Personal
More informationIdentity Theft. Protecting Yourself and Your Identity. Course objectives learn about:
financialgenius.usbank.com Course objectives learn about: Avoiding Identity Theft Recognize Phishing Attempts Getting Help for ID Theft Victims Identity Theft Protecting Yourself and Your Identity Index
More informationNew Horizon Bank Online Banking Agreement/Disclosure
New Horizon Bank Online Banking Agreement/Disclosure This Agreement governs the use of the New Horizon Bank Online Banking Services and is made and entered into by and between New Horizon Bank ("Bank"),
More informationInformation to Protect Our Customers From Identity Theft
Our Customers From Identity Theft Identity (ID) Theft Capital One understands that ID Theft is a growing concern of our customers, and that it is a frustrating experience for victims. We share these concerns
More informationProtecting Your Tax Identity Tax Identity Theft Awareness Tips
Protecting Your Tax Identity Tax Identity Theft Awareness Tips Tax ID thieves are ready are you? Tax identity theft happens when someone uses your Social Security number to get a tax refund or a job, and
More informationDetecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
More informationAdministrative Procedure 5800 Prevention of Identity Theft in Student Financial Transactions
Reference: Fair and Accurate Credit Transactions Act, ( Pub. L. 108-159) The purpose of the Identity Theft Prevention Program (ITPP) is to control reasonably foreseeable risks to students from identity
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationBad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
More informationNATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
More informationCustomer Service 1-800-711-BANK (2265) Weekdays: 7:00 a.m. - 10:00 p.m. Weekends: 8:00 a.m. - 6:00 p.m. cbc@fcbanking.com. Online Banking Guide
Customer Service 1-800-711-BANK (2265) Weekdays: 7:00 a.m. - 10:00 p.m. Weekends: 8:00 a.m. - 6:00 p.m. cbc@fcbanking.com Online Banking Guide Table of Contents Welcome 2 First-Time Users Navigate Online
More informationHow to Prevent It What to Do If You Are a Victim
How to Prevent It What to Do If You Are a Victim www.tn.gov/consumer www.tn.gov/safety Tennessee Division of Consumer Affairs Identity theft happens when someone steals your personal information and uses
More informationI. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
More informationE-MAIL & INTERNET FRAUD
FRAUD ALERT! FRAUD ALERT! Guarding Against E-MAIL & INTERNET FRAUD What credit union members should know to counter Phishing Pharming Spyware Online fraud On-Line Fraud Is Growing E-Mail and Internet Fraud
More informationFFIEC Supplemental Guidance to Authentication in an Internet Banking Environment. Robert Farmer Senior Technology Compliance Manager
FFIEC Supplemental Guidance to Authentication in an Robert Farmer Senior Technology Compliance Manager 1 888 250 4400 Effective Date The FFIEC Supplement to Authentication in an was issued on June 28,
More informationCash Management User Manual
Product Overview This manual contains instructions for setting up your Administrator access as well as establishing access for those who will have access to your account information through Online Banking
More informationBE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
More informationRed Flags Identity Theft Training Program. Fall 2015
Red Flags Identity Theft Training Program Fall 2015 Background In 2003, U.S. Congress enacted the Fair and Accurate Credit Transactions Act of 2003 (FACTA). FACTA requires creditors to adopt policies and
More informationEmerging risks for internet users
Sabeena Oberoi Assistant Secretary, Cyber Security and Asia Pacific Branch Department of Broadband, Communications and the Digital Economy Government s role - DBCDE The new Australian Government Cyber
More informationProtecting Yourself from Identity Theft
Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................
More informationElectronic Fraud Awareness Advisory
Electronic Fraud Awareness Advisory Indiana Bankers Association Fraud Awareness Task Force February, 2012 Electronic Fraud Awareness Advisory Purpose/Summary The Indiana Bankers Association (IBA) was involved
More informationCorporate Internet Banking. Authorization Worksheets
Corporate Internet Banking Authorization Worksheets CLIENT AUTHORIZATION General Company Information Company Name: Client Number: Address: City, State, Zip: Contact Name: (Maximum 35 characters) Phone
More informationPersonal Security Check List
CASE is a Partnership of the District Attorney and the Community to Prevent Fraud and Exploitation Denver District Attorney Fraud Line 720-913-9179 www.denverda.org Denver District Attorney Mitch Morrissey
More informationA Quick Reference Guide to Online Banking & Bill Payment
A Quick Reference Guide to Online Banking & Bill Payment Bringing new features, enhanced security and expanded functionality to your Enterprise Bank & Trust Online Banking experience. www.enterprisebank.com
More informationProtect Your Personal Information. Tips and tools to help safeguard you against identity theft
Protect Your Personal Information Tips and tools to help safeguard you against identity theft Trademark of Visa International Service Association; Visa Canada Association is a licensed user. WHAT IS IDENTITY
More informationWhen you are prompted to enroll, you will be asked to enter a Security Phrase and select/answer three different Challenge Questions.
IMPORTANT SECURITY INFORMATION We take your online security seriously. Your online banking site contains a security feature called Enhanced Authentication. Everyone will be required to enroll in Enhanced
More informationDOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
More informationO1 ONLINE BANKING Agreement Option 1 Credit Union
O1 ONLINE BANKING Agreement Option 1 Credit Union By enrolling in Option 1 Credit Union s O1 ONLINE Banking service, you agree to the addition of the following to the Terms and Conditions for Personal
More information