Fraud, what to look for
|
|
|
- Veronica Hamilton
- 10 years ago
- Views:
Transcription
1
2 Spotting a fraud Location Website Document filing history Accounts filed Director information Application form Fraud, what to look for Case Studies Fraudulent company - Star Catcher Limited Impersonation Laxmi Properties Limited
3 Location Verify addresses by using the Royal mail link below Use Google maps to verify address, street view is a useful tool. Contact the businesses next door to find out how long they have been based there or if they are there at all. Be wary of virtual office addresses as a business does not have to be physically based at the address. Also mail and telephone call can be forwarded to an alternative address or number. Look out for large orders being delivered to a residential address.
4 Website Verify the website address on whois search which will provide you with all the registration details.
5 Document filing history Fraud, what to look for Companies House Direct list all the documents filed. Look for unusual filing patterns. A number of changes in the registered office in a short space of time. Filing dormant accounts, then filing an amended trading set. Accounts submitted shortly after the year-end date. Accounts filed for different accounting periods within a short period of each other. Changes in company officials.
6 Accounts filed Fraud, what to look for Look out for unusual high levels of turnover and profit for the first year s trading. Make sure the share capital stated in the accounts match the amount stated on the annual return. A revaluation reserve can only be stated on the first year s trading results. Check directors were appointed for the trading period and when the accounts were signed.
7 Director information Fraud, what to look for Check for any other director associations via credit line by taking a director report. Our system only picks up the association if the name and service address is exactly the same. Check the date company officials were appointed or when they resigned and the date these documents were filed at Companies House. The resignation and appointment dates can be back dated.
8 Application form Fraud, what to look for Check all the information on the application form matches the credit report. This includes all addresses, VAT number, telephone address, business activity, website. Be wary of hotmail, google and yahoo addresses. Follow up trade references if you are not sure about an application.
9 VAT numbers can be verified using the following link; edlanguage=en
10 Star Catcher Limited - Case Study Fraud, what to look for Location: Railway House, Bruton Way, Gloucester, GL1 1DG Serviced office address Telephone number for the premises
11 2 sets of amended trading accounts filed within 17 days. Appointment date stated as 01/09/2011. The 29/02/2012 and 28/02/2013 accounts were filed as non-trading accounts. Since May 2013 there has been a surge in filings at Companies House.
12 38% profit margin
13 Annual Return made up to 22/02/2013 states share capital as 1
14 The company was established 22/02/2011 and the first enquiry was on 06/09/2013.
15 Graydon took away the rating on 01/10/2013 and consequently CCJs in excess of 49K has been registered.
16 The addresses provided were Rosemary Street, Mansfield, NG18 1QL and Hanger 9, Main Street, Normanton, Bottesford, Nottingham, NG13 0EP Serviced office again. The delivery address of Hangar 9 is a storage address.
17 Case Study Laxmi Properties Limited Website: The company has been established since 24/02/1997
18 Laxmi Properties had no contact details on the web, so it was an ideal company to impersonate. Some impersonators change the registered office of the company. If you have a signed application form compare signatures with documents filed at Companies House if you are unable to contact the legitimate company. If the accounts have been audited check if they are registered members of ACCA and ICAEW. Recently we were alerted to another impersonation related to Laxmi Properties Limited. Dorridge Estates Limited
19
20 Any Questions?
Clare College Financial Policies and Procedures Supplier Account Set Up and Change Procedures
Financial Policies and Procedures Supplier Account Set Up and Change Procedures Set Up.doc - 1 - Contents 1. Supplier Account Set Up 1.1 Supplier details on SUN 1.2 Supplier payment details 2. Changes
Auditors Their duties and rights
Auditors Their duties and rights A quick guide Introduction We have produced this information booklet to explain the role of auditors under the Companies Acts. What is an audit? An audit is an examination
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES)
NEVADA SYSTEM OF HIGHER EDUCATION PROCEDURES AND GUIDELINES MANUAL CHAPTER 13 IDENTITY THEFT PREVENTION PROGRAM (RED FLAG RULES) Section 1. NSHE... 2 Section 2. UNR... 4 Section 3. WNC... 9 Chapter 13,
UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
20 Ideas to Reduce Your Tax Bill
Corporation Tax 1. Incorporate There is still plenty to be gained from incorporation. A married couple in a trading partnership with profits of 100K will pay total tax and NIC of about 27K in 2009/10.
NO: 19-11 DATE: September 2, 2011
NO: 19-11 DATE: September 2, 2011 TO: FROM: SUBJECT: All Agents Licensed in Puerto Rico James P. Payne, Compliance Officer National Western s Protocol for the Prevention and Detection of Cases of Financial
Ouachita Baptist University. Identity Theft Policy and Program
Ouachita Baptist University Identity Theft Policy and Program Under the Federal Trade Commission s Red Flags Rule, Ouachita Baptist University is required to establish an Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program
City of Hercules Hercules Municipal Utility Identity Theft Prevention Program Purpose The purpose of the program is to establish an Identity Theft Prevention Program designed to detect, prevent and mitigate
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
Change of account signatories Limited Companies (including CICs and CIO/SCIOs) and Limited Liability Partnerships
Change of account signatories Limited Companies (including CICs and CIO/SCIOs) and Limited Liability Partnerships Please be aware of the following when completing the change of signatories mandate: Ensure
Land Registry Help protect yourself from property fraud keep your contact details up-to-date. May 2016
Land Registry Help protect yourself from property fraud keep your contact details up-to-date May 2016 Could you be at risk of property fraud? If you own a property, it could be a target for fraudsters,
Travis County Water Control & Improvement District No. 17. Identity Theft Prevention Program. Effective beginning November 20, 2008
Travis County Water Control & Improvement District No. 17 Identity Theft Prevention Program Effective beginning November 20, 2008 I. PROGRAM ADOPTION The Travis County Water Control and Improvement District
LASTING POWER OF ATTORNEY QUESTIONNAIRE
LASTING POWER OF ATTORNEY QUESTIONNAIRE The purpose of this questionnaire is to gather the information needed to complete your LPA(s). We will need your full name and address etc and those of your attorneys
TECHNICAL RELEASE TECH 09/14BL ACCOUNTANTS REPORTS ON COMMERCIAL PROPERTY SERVICE CHARGE ACCOUNTS
TECHNICAL RELEASE TECH 09/14BL ACCOUNTANTS REPORTS ON COMMERCIAL PROPERTY SERVICE CHARGE ACCOUNTS ABOUT ICAEW ICAEW is a professional membership organisation, supporting over 140,000 chartered accountants
Detecting, Preventing, and Mitigating Identity Theft
THE RED FLAGS RULE Detecting, Preventing, and Mitigating Identity Theft Training for Ball State University s Identity Theft Protection Program What is the Red Flag Rule? Congress passed the Fair and Accurate
Preventing identity theft
Preventing identity theft About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence
3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009
IDENTITY THEFT PREVENTION PROGRAM TRAINING MODULE February 2009 Table of Contents Introduction to the Training Module.. i I. Introduction. 1 II. Definitions. 3 III. Recognizing Identity Theft.. 6 IV. Identifying
Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.
Avoiding Fraud Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk. Intoduction Fraud comes in many forms and hurts merchants of all sizes. Whether
Secure Email FAQs for External Stakeholders
Secure Email FAQs for External Stakeholders Ver: 07 November 2012 What is secure email and why am I getting encrypted emails from the IPCC? Why do I have to register to open a Registered Envelope? What
Guide to credit card security
Contents Click on a title below to jump straight to that section. What is credit card fraud? Types of credit card fraud Current scams Keeping your card and card details safe Banking and shopping securely
UNIVERSITY OF ST ANDREWS
UNIVERSITY OF ST ANDREWS CORPORATE CARD POLICY Version 5 Last updated by Michele Merrington (18.10.2015) 1. Introduction... 2 2. Application... 2 3. Compliance... 3 3.1. Cash Withdrawals... 3 4. Prevention
Identity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
Contract and Procurement Fraud. Vendor Management
Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring
PROFESSIONAL COURSES FOR PRACTITIONERS 2015. https://events.accaglobal.com / 1
PROFESSIONAL COURSES FOR PRACTITIONERS 2015 https://events.accaglobal.com / 1 INTRODUCTION WELCOME TO ACCA UK PROFESSIONAL COURSES. OUR COURSES HAVE BEEN SPECIFICALLY DESIGNED TO KEEP YOU INFORMED OF THE
Lake Havasu City. Identity Theft Prevention Program
Lake Havasu City Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION Lake Havasu City (City) developed this Identity Theft Prevention Program (Program) pursuant to the
How To Spot & Prevent Fraudulent Credit Card Activity
Datalink Bankcard Services How To Spot & Prevent Fraudulent Credit Card Activity White Paper 2013 According to statistics from the U.S. Department of Justice and the Consumer Sentinel Network, credit card
Experian Data. A simple insight into our solutions. Experian Data Quality Tools
Experian Data Quality Tools A simple insight into our solutions Experian Data Quality Tools Are you exploring your data effectively? Your data is only a valuable business asset if the information you collect,
Wake Forest University. Identity Theft Prevention Program. Effective May 1, 2009
Wake Forest University Identity Theft Prevention Program Effective May 1, 2009 I. GENERAL It is the policy of Wake Forest University ( University ) to comply with the Federal Trade Commission's ( FTC )
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14
Village of Brockport Identity Theft Prevention Program Effective December 1, 2009 Confirmed 7/21/14 I. PROGRAM ADOPTION The Village of Brockport ( Village ) developed this Identity Theft Prevention Program
A Guide to the use of your personal and business data by PACCAR Financial PLC and Credit Reference and Fraud
Important Data Protection A Guide to the use of your personal and business data by PACCAR Financial PLC and Credit Reference and Fraud Prevention Agencies commercial v 11.00 final June 2009 Q: What is
Request for City Council Action
Request for City Council Action Date: March 17, 2009 Agenda Section: General Business Originating Department: Finance/Legal No. 6 Item: Ordinance Approving and Adopting an Identity Theft Program No. 6.2
Powers of Attorney in New South Wales. This fact sheet also contains the forms to make a general power of attorney or an enduring power of attorney.
FACT SHEET www.lpi.nsw.gov.au March 2014 Powers of Attorney in New South Wales This fact sheet also contains the forms to make a general power of attorney or an enduring power of attorney. What is a power
Physician Office Compliance with the Red Flag Rule
Physician Office Compliance with the Red Flag Rule The Red Flag Rule, implemented by the Federal Trade Commission (FTC) on May 1, 2009, requires all financial institutions and creditors, including physician
Fraud Advice for Businesses
Fraud Advice for Businesses What is Fraud? Fraud is a crime in which some kind of deception is used for personal gain. Fraud is sometimes also referred to by other names such as a scam or con. Businesses
The Education Fellowship Trust. Review of financial management and governance
The Education Fellowship Trust Review of financial management and governance April 2014 Contents Executive Summary 3 Background to the Trust 5 Findings 6 Governance 6 Risk and Financial Control Framework
Lincoln Financial Group. FTC/SEC Red Flags Identity Theft Prevention Program
Lincoln Financial Group FTC/SEC Red Flags Identity Theft Prevention Program Program Summary For Internal Use Only Table of Contents Page The Red Flags Rule 3 Key Points of the Program 4 Covered Accounts
Clause 1. Definitions and Interpretation
[Standard data protection [agreement/clauses] for the transfer of Personal Data from the University of Edinburgh (as Data Controller) to a Data Processor within the European Economic Area ] In this Agreement:-
University Identity Theft and Detection Program (NEW) All Campuses and All Service Providers Subject to the Red Flags Rule
NUMBER: BUSF 4.12 SECTION: SUBJECT: Finance and Planning University Identity Theft and Detection Program (NEW) DATE: March 3, 2011 Policy for: Procedure for: Authorized by: Issued by: All Campuses and
Driving License. National Insurance Number
STAR has teamed up with Prevention of Fraud in Travel (PROFiT) and the Fraud Intelligence Network (FIN) to offer our members the best advice about fraud prevention. We recognise the increasing threat of
Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group
Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation
A Guide to Email. For Beginners
A Guide to Email For Beginners What is email? Email is a way of sending messages or letters to someone electronically using the internet. Messages usually arrive instantly in the recipient s mailbox. In
Tariff of Charges FIRST
Tariff of Charges FIRST QNB First Membership QNB First Membership QNB First - Premium (Debit Card) QNB First - World Card (Debit & Credit Card*) *subject to the Bank's Terms and Conditions Accounts Local
UK Money Solutions Client Support Guide
UK Money Solutions Client Support Guide Open a new basic bank account. Tell us the bank name, branch address, sort code, account name and number. This type of account can be opened on the day you apply,
Meter Exchange Program Community Information Packet
Meter Exchange Program Community Information Packet SYSTEM-WIDE DUQUESNE LIGHT METER SWITCH OUT What Is Happening? During the next several weeks, Duquesne Light will exchange existing electric meters with
Proposal Form for Professional Indemnity Insurance INVESTMENT MANAGERS AND OTHERS
Proposal Form for Professional Indemnity Insurance INVESTMENT MANAGERS AND OTHERS THIS APPLICATION IS FOR A CLAIMS MADE INSURANCE POLICY GENERAL INFORMATION 1. Please state the name and address of all
University of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
IDENTITY THEFT DETECTION POLICY
IDENTITY THEFT DETECTION POLICY Approved By: President s Cabinet Date of Last Revision: May 5, 2009 Responsible Office/Department: Business and Finance Policy Statement Grand Valley State University (GVSU)
Responsive residential mortgages
Your guide to residential mortgages, micro mortgages and shared ownership Responsive residential mortgages Core Products & Criteria Interest Only or Capital & Repayment mortgages; 100% Shared Ownership
Welcome to the convenience of a Bank of Melbourne. Visa Debit Card.
Welcome to the convenience of a Bank of Melbourne Visa Debit Card. Everyday Purchases Type of transaction ATM cash withdrawal In-store purchase In-store cash-out Bill payment How to access funds in Australia
I. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
FCU BUSINESS LOANS APPLICATION FORM
FCU BUSINESS LOANS APPLICATION FORM FAIRshare Credit Union is authorised by the Prudential Regulation Authority and regulated by the Financial Conduct Authority and the Prudential Regulation Authority
Fraud Awareness Session -WestJet Presented by Alexis Gunderson Team Leader WestJet Fraud Investigation
Fraud Awareness Session -WestJet Presented by Alexis Gunderson Team Leader WestJet Fraud Investigation Agenda Fraud Investigation Team The Fraudster M. O. Travel Industry Fraud Trends Strategies to Mitigate
A Guide to Selling. Choosing an Estate Agent
A Guide to Selling This article deals with issues relating to selling your house including the particular legalities unique to Northern Ireland. As a property seller you probably have some knowledge of
PITTSBURGH CARE PARTNERSHIP, INC. COMMUNITY LIFE PROGRAM POLICIES AND PROCEDURES. Identity Theft Prevention Program Policy for Health Care Providers
SUBJECT: Identity Theft Prevention Program Policy for Health Care Providers NUMBER: 1022 REG. REF.: Identity Theft Red Flags Rule (the Rule ), 16 C.F.R. 681, adopted by the Federal Trade Commission Adoption
Echo Entertainment Group Limited (ABN 85 149 629 023) Risk and Compliance Committee Terms of Reference
(ABN 85 149 629 023) Terms of Reference Contents 1 Introduction to the Terms of Reference 1 1.1 General 1 1.2 Authorities 1 1.3 Board approval 1 1.4 Definitions 1 2 Role of the Committee 1 3 Duties and
