Refund scams come in three basic forms:
|
|
|
- Rebecca Dinah Wade
- 9 years ago
- Views:
Transcription
1 REFUND SCAMS Refunds are recognized throughout the retail industry as the most frequently abused transaction, as well as the number one source of cash losses in the retail industry. Literally tens of billions of dollars are lost annually to refund scams. While there are many products sold in the typical Ace Hardware store that are very tempting to steal, there is nothing as tempting to steal as CASH! Refund scams come in three basic forms: By a cashier working independently to embezzle cash. By a cashier working in collusion with an accomplice to embezzle cash. By a customer who has either stolen merchandise from your or another retailer s store, or purchased it from another retailer, and attempts to obtain a cash refund at your store. There are variations in the MOs used in each of these three scenarios, to include some very ingenious methods of disguising the act and creating what appear to be routine, acceptable documents and transactions. A dishonest cashier skillful in the processing of fraudulent refunds, can embezzle thousands of dollars over a relatively short period of time - and never be over or short. There is a host of controls available within the Activant E4W system designed to reduce your risk of loss to this very prevalent type of theft. The challenge is to put sufficient controls in place to deter dishonesty, while keeping refunds as speedy and customer friendly as possible. Rest assured that if your controls are lacking, it is only a matter of time (normally a very short time) before a dishonest associate or customer will take advantage of that laxity. Let's discuss the primary scenarios. FRAUDULENT RETURN BY A DISHONEST CASHIER This type of theft is possible when internal controls are insufficient (or not enforced) at the point of sale and the subsequent cash and sales reconciliation process is inadequate. The following controls are recommended, at a minimum: GENERAL Consider establishing a time frame within which refunds will be given (e.g., 90 days). If at all possible (and it is if you have three or more POS terminals) enforce a one cashier per drawer policy. This will allow you to hold a cashier responsible for everything that happens at that terminal during that associate's shift. A dishonest cashier cannot hide under the umbrella of multiple cashiers operating out of the same POS terminal. Again, if possible, designate one POS terminal for refunds. It should be the POS terminal closest to the entrance door. The fewer associates involved in the refund process, the better. Count down the cashier's drawer at shift-end. This should be done in a locked office with a manager present.
2 Do not give the cashier access to the DCD report, cash balancing report or any other report that contains actual cash sales data. A cashier should not know how much cash should be in the till prior to counting down. If the DCD report is used for the countdown (recommended), configure it to include refund data (number and dollars). NOTE: The same recommendation applies to voids. Reconcile refund documentation against POS refund data during the cashier countdown process, to at least confirm that the appropriate number of refund documents is present. Treat missing documents as a red flag and resolve the matter before the cashier leaves. Do not allow cashiers to operate out of an open drawer. Require the drawer to be closed after every transaction. If a transaction can be rung with the drawer open, modify Activant option 5434 to prohibit it. If you have a CCTV system, ensure that you have appropriate coverage of the POS terminals. There should a separate camera for each POS terminal and they should be installed in a manner that provide an unobstructed view of the cashier's hands (see article entitled "CCTV Surveillance in Ace Hardware Stores"), THE REFUND PROCESS Set a dollar threshold (Activant Option 5403) that mandates a manager override to permit a refund transaction to proceed. What threshold? Prepare a list of each refund transaction during the past 30 days by dollar value. Let's say there were 250 refunds with a total dollar value of $6,045. That would equate to $24.18 as the value of the typical refund. The dollar threshold for manager override could then be set at $25.00 without overly controlling the refund process and imposing an impractical workload on managers. Use either the Ace Merchandise Return form (Ace Stock Nr ) or the Activant Refund Receipt (see Options to configure the refund receipt) to provide a hard copy record of important refund data. NOTE: The Ace form is advisable as it contains blanks for various data, as well as a means of documenting the disposition of the returned item. If the Activant Refund Receipt is used in lieu of the Ace Merchandise Return form, it is recommended that the following data elements be included: o Customer Name (Printed) o Telephone Number o Customer Signature o Manager Approval Signature (for those refunds that require a manager override). If the customer does not have a purchase receipt, ask a few questions to pin down the estimated purchase date, was anything else purchased at the same time, etc. Be alert for hesitant answers or facial expressions that belie the verbal answers to your questions.
3 Also ask for, look at and confirm the customer's name from his driver's license, even if a store credit is given in lieu of a cash return. If the customer claims not to have a driver's license or other form of picture ID, explain that a refund/credit cannot be provided without proper identification. NOTE: See RETURNS VALIDATION below. If the customer does not have a receipt, and provides acceptable identification, provide a store credit in lieu of a cash refund. Consider using the Ace Merchandise Card in these cases. Like a gift card, but recognizable as having been issued in lieu of a cash refund, this will alert the cashier who receives it to ensure that the store copy of the receipt is annotated as having been purchased with Merchandise Card. Consider not combining refunds and sales in the same transaction. While this is a convenience, it also has an internal control shortcoming. Specifically, if the net amount of the transaction is a positive number, in other words if the customer owes money, then that transaction will not be counted as a refund in the RDS report. It will show up in the Customer Returns Viewer, but not in the RDS report - and the RDS report is the report used by most Ace retailers the following day to reconcile cash and sales and prepare the bank deposit. A dishonest cashier who knows this can test the system by not including the refund paperwork for such a transaction and see if it's caught. If not, then he/she knows that the odds are in his/her favor to use that as a tool in the future and not be detected. This scenario has also been used by a dishonest cashier in collusion with a confederate to "sweetheart" a sale (allow the customer to leave without paying the full price of the items removed). The scam works like this: scan the item, normally a high ticket item, and then enter a refund for a non-existent item that is priced less than the item scanned. For example, a $150 cordless drill is scanned and then a SKU of an item selling for $99 is entered as a refund. The result is that the customer's relative or friend is charged a net price of $51 plus tax for the $150 drill, and the refund does not show up in the RDS report's refund totals/dollars. NOTE: In the example cited, it would be necessary for a manager override dollar threshold to not be in force. Cashiers should not return refunded merchandise to stock. This task should be performed by sales floor associates. And if the Ace Merchandise Return form is used to document refunds, the tab of the form should be taped to the actual item so that the associate disposing of it can annotate what action was taken (e.g., returned to stock, Policy A, etc.) and then turned in to the office to be stapled to the basic form). On a weekly basis, reconcile the QOH in the IMU against a physical count of at least 10% of all refunds (be sure and select some high value and frequently stolen product SKUs). If there is a discrepancy and you have CCTV coverage of the POS terminals, review the suspect refunds; also, if your CCTV system has a "smart search" feature (see article entitled "CCTV Surveillance in Ace Hardware Stores"), review activity at the specific four foot section where that SKU is displayed for a time frame beginning at least two days before the refund to the date of your review. You will quickly see all activity at that four foot section during that time frame. When reconciling cash and sales, it is important that the number of refunds listed on the RDS report be reconciled against supporting documentation. If there is a missing refund
4 document, this should be treated as a red flag and investigated, to include reviewing CCTV surveillance footage. Look carefully at all refund documentation to ensure that the required information was obtained from customers and, when appropriate, a manager's signature is present. It is a good idea to have a sample of all managers' signatures available to compare with suspect signatures, as dishonest cashiers have been known to forge a manager's signature on a refund receipt. On a weekly basis, follow up on at least 10% of all refunds with a telephone call to the customers. Be sure to select some refunds processed by each cashier for the follow-up. A Refunds Verification form can be found within the Forms tab for use in documenting these calls. The form even contains a specific recommended call dialogue for the associate making the calls. If a customer claims not to have received a refund or if the number dialed is a non-working number, an immediate inquiry should be conducted. If there is CCTV coverage of the POS terminals, review the suspect refund(s). Calculate your cash refunds as a percentage of cash sales. If the percentage exceeds 5% of sales, this is a red flag of possible issues within the refund process. FRAUDULENT RETURN BY A CUSTOMER This is an act by (1) a basically honest customer who may truly think he purchased the product at your store (but didn't), or he actually knows that he didn't purchase it at your store; or (2) a thief who stole the product from your or another store. In both cases, the customer wants a cash refund. In the case of the honest customer, he will normally not have a receipt; however, the thief may actually have a receipt - but it may not be valid. It is a common practice for thieves to shoplift an item and then attempt to refund it for cash (without a receipt). This practice can be easily foiled with a policy that provides for a store credit in lieu of a cash refund when there is no proof of purchase. In those cases, it is important to ensure that when the store credit is subsequently used, that the receipt provided the customer at that time is clearly identified as having been paid for with a store credit.. This is to ensure that the customer doesn't return later with that receipt and request and be given a cash refund. Shoplifters have also been known to purchase an item in order to obtain a receipt, then shoplift the same item and refund it with that receipt. Now they have the item and cash. Some professional shoplifting rings are known to produce their own receipts using a scanner, laptop computer, printer and standard receipt paper - sometimes all contained in a van in the parking lot. This scam works when the store does not have a state-of-the-art POS system with the capability to confirm that the item shown on the receipt was, in fact, not purchased at that store. NOTE: SEE RETURNS VALIDATION below. In all cases, obtain a verifiable customer ID (driver s license or other government ID with picture), and record that information on your refund document. If the customer is attempting to defraud you, he/she will not normally consent to providing a picture ID. All refund requests without receipts should be approved, in writing, by a manager. This
5 should be done while the customer is present. NOTE: You may want to set a dollar threshold in this process, but it should be much lower than your standard manager override threshold for refunds with receipts - and it will, out of necessity, have to be a manual system. RETURNS VALIDATION FEATURE (ACTIVANT EAGLE FOR WINDOWS) The Returns Validation feature of the Activant POS system provides a number of automated tools that greatly assist in validating and documenting refunds. It is designed to provide additional control over the refund process by validating returns against past purchases. While it is a valuable enhancement of your ability to detect and deter fraudulent refund attempts by a customer, it will not, in and of itself, prevent fraudulent refunds by a dishonest associate. When setting up this feature, you must determine the time frame for which past purchases and refunds will be displayed. If you have a policy that refunds are granted only within 90 days of purchase, then set the Returns Validation feature up to retain data for 90 days. There are a number of POS options and security bits that must be turned on in order to enable the Returns Validation feature. Elements of the Returns Validation feature include: Returns validation window. Customer returns viewer. Purchase history automatically displayed. Warning message if number of items being refunded exceeds number purchased. Warning message if item being refunded was not purchased at your store. Purchase invoice data automatically printed on refund invoice. Automatic update of data. Multi-store capability.
6 IN SUMMARY As you can see, there is much to know about the risks associated with the refund process and what must be done to protect your store, while at the same time providing good customer service. Contact Retail Loss Prevention for additional guidance and information on recommended internal controls, both human and electronic, to enhance your protection
Cashier s Cash Handling Procedures. Revised 7/1/2013
Cashier s Cash Handling Procedures Revised 7/1/2013 1 Appendix A Cashiers Handbook Sec. 1: Why Your Job Is Important As a cashier your primary responsibility is the proper handling of the money received
Identity Theft. Protecting Your Credit Identity 1.3.1.G1
Identity Theft Protecting Your Credit Identity Identity Theft The dollar loss suffered because of identity theft from consumers was 343 million in 2002. Federal Trade Commission The number of identity
Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner
Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and
Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine
Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine 1 Dear Nonprofit Leader, The single greatest asset of a nonprofit is arguably its reputation. When theft or misappropriation of assets
Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session
Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session Q. What types of checks are eligible for remote deposit capture? A. All checks drawn on US banks are eligible
Fraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
2) Point of Sale Handbook BASIC TRAINING WORKSHOP & REFERENCE MANUAL
2) Point of Sale Handbook BASIC TRAINING WORKSHOP & REFERENCE MANUAL E4W Level 14 Last Revision on Wednesday, February 09, 2005 TRAINING ASSISTANCE Help is available to aid you in the operation of your
SO-03 Sales Order Processing Administration
SO-03 Sales Order Processing Administration SO03 SOP Administration Contents Contents...1 Overview...2 Objectives:...2 Who should attend?...2 Dependencies...2 Credits...3 Convert credit value only...4
INTRODUCTION. Identity Theft Crime Victim Assistance Kit
Identity Theft Crime Victim Assistance Kit INTRODUCTION In the course of a busy day, you may write a check at the grocery store, charge tickets to a ball game, rent a car, mail your tax returns, change
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
Cash, Petty Cash, Change Funds, and Credit Cards
CASH As public servants, it is our responsibility to safeguard taxpayer s dollars while adhering to laws and regulations governing processes over cash handling. Internal controls over cash are necessary
Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D.
Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most
Identity Theft: Knowingly uses identifying information of another to obtain cash,
THEFT, C.R.S. CRS 18-4-401 401 Boulder Police Department Non Emergency 303-441 441-3333 Emergency 911 Agenda Officer Robyn Vanderleest Theft Definition i i Felony vs. Misdemeanor Employee Theft Credit
Top 10 Ways Employees Steal From Their Employers
Top 10 Ways Employees Steal From Their Employers According to the Association of Certified Fraud Examiners, total business fraud in 2009 was $2.9 trillion dollars; small business, defined as less than
Internal Control Requirements December 11, 2002
1 Internal Control Requirements December 11, 2002 Internal controls are mechanisms, policies, and procedures used to minimize and monitor operational risks. In order to deter employees and/or members from
STX Beacon User Guide Tickets
STX Beacon User Guide Tickets 3 Ticket List: Tickets 4 Ticket Detail 5 New Ticket: Create New 5 New Ticket: Services 6 New Ticket: Products 6 New Ticket: Other 7 New Ticket: Other: Selling a Package 7
TEXAS CHRISTIAN UNIVERSITY. Purchasing Card Program Policies and Procedures
TEXAS CHRISTIAN UNIVERSITY Purchasing Card Program Policies and Procedures This Policies and Procedures Guide provides the general guidelines for using your Purchasing Card. Please read it carefully. Your
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
Source: Miss. Code Ann. 75-67-501; Miss. Code Ann. 75-67-515(1); Effective date February 20, 2003
Part 3 Chapter 3: Mississippi Check Cashers Act Rule 3.1 Purpose. These regulations are promulgated pursuant to Section 75-67-501 et seq., Miss. Code Ann., known as the Mississippi Check Cashers Act, to
Retail POS User s Guide. Microsoft Dynamics AX for Retail
Retail POS User s Guide Microsoft Dynamics AX for Retail January 2011 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and your people to make business
Internal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com
Bringing enterprise level security to your business Identity Theft Prevention Presented by: Matt Malone Assero Security www.asserosecurity.com Matt Malone Fall 2015 Spring 2016 IDENTITY THEFT Identity
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE PERSONAL CHECK and/or ATM CARD
ELECTRONIC FUND TRANSFER AGREEMENT AND DISCLOSURE PERSONAL CHECK and/or ATM CARD This agreement and disclosure applies to payment orders and funds transfers governed by the Electronic Fund Transfer Act.
15 Bad Things Identity Thieves Can Do With Your Identity
This free ebook is provided to help you protect yourself from fraud and identity theft by LeMay Mobile Shredding. LeMay Mobile Shredding offers mobile document shredding to help you destroy old tax forms,
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS
IDENTITY THEFT VICTIMS: IMMEDIATE STEPS If you are a victim of identity theft, take the following four steps as soon as possible, and keep a record with the details of your conversations and copies of
STATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age.
STATE BANK OF SPRING HILL INTERNET BANKING AGREEMENT WWW.SBSH-KS.COM Internet banking is not available to children under 18 years of age. PLEASE READ THIS AGREEMENT CAREFULLY AND KEEP A COPY FOR YOUR RECORDS.
MARKET LINE COMPUTERS TOTAL RENTAL: PRE-TRAINING MANUAL
MARKET LINE COMPUTERS TOTAL RENTAL: PRE-TRAINING MANUAL Thank you for choosing Total Rental as your Rental Management software. This pre-training manual will coincide with Total Rental customization according
Summary of Significant Revisions to the Accounting Procedures Manual For the Public Schools in the State of West Virginia
1-3 Not Specifically Addressed School personnel do not have statutory authority to enter into contracts or obligate board funds. Schools are not separate legal entities. 1-3 Not Specifically Addressed
Electronic Benefits Transfer (EBT) How To Use Your Benefit Card To Get Food Stamp and/or Cash Benefits. Pub-4596 (Rev. 04/08)
Electronic Benefits Transfer (EBT) How To Use Your Benefit Card To Get Food Stamp and/or Cash Benefits Pub-4596 (Rev. 04/08) YOUR BENEFIT CARD Keep your card in your card sleeve and in a safe place when
Eagle POS Procedure Guide For Epicor Bankcard Processing
Eagle POS Procedure Guide For Epicor Bankcard Processing Table of Contents Introduction... 3 1 Transactions using a Swiped Bankcard... 3 Basic Swiped Credit Card Sale & Return transaction... 3 Sales &
CardLink Merchant Services
CardLink Merchant Services w w w. b u t t e r f i e l d b a n k. k y C a r d L i n k M e r c h a n t S e r v i c e s S t a c k i n g t h e c a r d s i n y o u r f a v o u r Butterfield Bank's all-inclusive
Turning Transactions into Customer Interactions
Turning Transactions into Customer Interactions Teller Solution. Customer Solution. It s a simple fact. EZTeller is a comprehensive, easy-to-use teller system that s hard at work for more than 500 institutions
Identity Theft Protection
Identity Theft Protection Learning Objectives Discuss the aspects of identity theft Discuss the signs of recognizing when your identify has been stolen Understand the steps to take to reclaim your identity
543.7 What are the minimum internal control standards for bingo?
Bingo Purpose This section provides guidance on the development of internal controls, policies, and procedures for the operation of bingo. It has been compiled by tribal regulators, Class II gaming operators,
Banking Solutions for Nonprofits 101. Four Money Saving Strategies for Nonprofits with Bank Products
Banking Solutions for Nonprofits 101 Four Money Saving Strategies for Nonprofits with Bank Products Understanding Bank Options for Nonprofit Organizations What type of accounts are available for Nonprofits
Life Insurance Buyer's Guide
Life Insurance Buyer's Guide This guide can help you when you shop for life insurance. It discusses how to: Find a Policy That Meets Your Needs and Fits Your Budget Decide How Much Insurance You Need Make
MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014
MONROE COUNTY WATER AUTHORITY IDENTITY THEFT PREVENTION POLICY REVISED MARCH 2014 Section 41.90 of Title 12 of the Code of Federal Regulations (the Regulations ) requires every utility that offers or maintains
6865 Windcrest Drive Suite 100 Plano, TX 75024 Main: 972.202.8000 w w w. C o r n w e l l J a c k s o n. c o m
Protect Your Restaurant from Employee Embezzlement By Scott Bates, CPA Mitigating the risk of loss in restaurants through theft is an ongoing challenge. Automation has improved security in transactions
ABC Division Cash Handling Procedures Fiscal Year 20XX
ABC Division Cash Handling Procedures Fiscal Year 20XX I. PURPOSE AND OVERVIEW In accordance with MAPP 05.01.01, Cash Handling, all cash transactions involving the University, its colleges, or any departments
FINANCIAL CONTROLS POLICIES AND PROCEDURES FOR SMALL NONPROFIT ORGANIZATIONS
By Cindy Cumfer NOTE: These policies and procedures are designed for small nonprofits that do not have an administrator with financial expertise. They are set up to divide the fiscal control roles between
Pitt County Schools Individual School Accounting. Internal Controls and Responsibilities Fiscal Year 2009-10
Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Contents Page Principal Statement
IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority
MEMBER IDENTITY PROTECTION Protect Your Identity Security of Personal Information is Our Top Priority Imagine this Unexpectedly, you get turned down for a loan, you get a call from a collection agency
Management and Set up for Cash and Credit Card Handling Procedures
Management and Set up for Cash and Credit Card Handling Procedures This presentation is designed to give managers a brief outline of key procedures and controls that should be in place to safeguard cash
Prepared by Sgt. Gibbs, Thomas B. 82-11
Prepared by Sgt. Gibbs, Thomas B. 82-11 Collaborative partnerships between the law enforcement agency and the individuals and organizations they serve to develop solutions to problems and increase trust
Parent Frequently Asked Questions
Parent Frequently Asked Questions The following questions will assist in understanding how the service operates. Fees and charges Why am I charged a per deposit fee? To assist in covering bank merchant
First Data Retail Solution
First Data Retail Solution Challenge: POS Limitations Not enough functionality Expensive Support Plans Limited salability to about 20% of retail market No complex products or tracking of rental businesses
TCS Payment Processing Interface 1.0
TCS Payment Processing Interface 1.0 Purpose: Integrate Shift 4 payment card processing into TCS Reservations. Setup: To configure TCS reservations for use with Shift 4 UTG. First install the Shift4 UTG
PHARMACY SECURITY BEST PRACTICES
CHRIS CHRISTIE Governor KIM GUADAGNO Lt. Governor Division of Consumer Affairs Office of the Director 124 Halsey Street, 7 th Floor, Newark NJ PHARMACY SECURITY BEST PRACTICES Published May 1, 2013 New
Business Intelligence Portfolio
SMALL BUSINESS CORE COMMERCIAL COMMERCIAL INDUSTRIAL RETAIL FEDERAL SYSTEMS BANKING WHITE PAPER Business Intelligence Portfolio Store Intelligence Store Intelligence How investing in a store business intelligence
Cardholder Guide. Applying for a Card
Cardholder Guide Applying for a Card Corporate Purchasing Card Cardholder New Account Form needs to be filled out for every candidate with the appropriate department manager as well as the Comptroller's
Miami University Purchasing Card Policy & Procedure
Miami University Purchasing Card Policy & Procedure MAY 22, 2015 1 Table of Contents Program Purpose... 3 Overview... 3 Advantages... 4 Getting Started- Card Application & Activation... 4 Capabilities,
OFFICIAL CASH HANDLING PROCEDURES FOR DEPARTMENTS, STUDENT FINANCIAL SERVICES, AND ACCOUNTING
Last Updated 7/15/15 OFFICIAL CASH HANDLING PROCEDURES FOR DEPARTMENTS, STUDENT FINANCIAL SERVICES, AND ACCOUNTING To be in compliance with the Cash Handling and Deposits Policy, Departments must also
PC Banking Service Agreement
Last Amended 01/01/16 AGREEMENT AND DISCLOSURES Before using the ZB, N.A. dba California Bank & Trust PC Banking Service, you must consent to receive disclosures electronically, and read and agree to the
ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE
ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure governs your use of any of the following electronic fund transfers (EFT) services (some of which
Debit MasterCard Application
Debit MasterCard Application This application is for a Devon Bank Debit MasterCard. In order to issue a personalized, individual card to either signer of a joint account, each owner must fill out a separate
SelfScore Cardholder Agreement for Cards issued by Celtic Bank
SelfScore Cardholder Agreement for Cards issued by Celtic Bank SelfScore has partnered with Celtic Bank (together referred to as "us," "we," "our," or the like), Utah industrial member FDIC, to offer this
Card Not Present Fraud Webinar Transcript
Card Not Present Fraud Webinar Transcript All right let s go ahead and get things started, and to do that, I d like to turn it over to Fae Ghormley. Fae? Thank you for giving us this opportunity to share
CHAPTER 99-01.3-04 BINGO
Section 99-01.3-04-01 Bingo 99-01.3-04-02 Equipment 99-01.3-04-03 Conduct and Play 99-01.3-04-04 Cash Register 99-01.3-04-05 Tickets 99-01.3-04-06 Paper Card Count 99-01.3-04-07 Floorworker Sales Report
Red Flag Rules Information and Training
Red Flag Rules Information and Training What are Red Flag Rules? The Red Flag Rules: - Are enforced by the Federal Trade Commission (FTC), the federal bank regulatory agencies, and the National Credit
Eagle Setup Guide For Epicor Bankcard Processing
Eagle Setup Guide For Epicor Bankcard Processing Table of Contents Introduction... 3 1 Before your implementation... 3 2 Licensing Options (MSY Flags)... 4 3 Options for Bankcards... 5 4 Debit Card Alternate
Deposit of Cash Receipts
Deposit of Cash Receipts Table of Contents 01. Policy Statement... 2 02. Reason for Policy... 2 03. Who Needs to Know This Policy... 2 04. Bonding Requirements... 2 05. Definitions... 2 06. Lockboxes and
Life Insurance Buyer's Guide
Life Insurance Buyer's Guide This guide can help you when you shop for life insurance. It discusses how to: Find a Policy That Meets Your Needs and Fits Your Budget Decide How Much Insurance You Need Make
Policy for Protecting Customer Data
Policy for Protecting Customer Data Store Name Store Owner/Manager Protecting our customer and employee information is very important to our store image and on-going business. We believe all of our employees
Electronic Funds Transfer Agreement and Disclosure
Electronic Funds Transfer Agreement and Disclosure This Electronic Funds Transfer Agreement is the contract which covers your and our rights and responsibilities concerning the electronic funds transfer
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity
Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity Stillman Bank works hard to serve and protect our customers identities and ensure their safety. That s why we have
INTERNAL CONTROL REFERENCE GUIDE. INTERNAL CONTROLS for GENERAL BUSINESS OPERATIONS
INTERNAL CONTROL REFERENCE GUIDE INTERNAL CONTROLS for GENERAL BUSINESS OPERATIONS Updated by Ohio University Internal Audit Office November 2011 ***This document was retrieved from the Central Michigan
Information carelessly discarded into the trash can be stolen when a thief digs through the garbage.
Identity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information. Identity theft can wreak havoc on an individual s credit report, cause
A-21 Appendix: Comprehensive Cases CASE A.4: THE WOODEN NICKEL 1
A-21 Appendix: Comprehensive Cases CASE A.4: THE WOODEN NICKEL 1 Background The Wooden Nickel is a small retail clothing store located in Stillwater, Oklahoma, across the street from Oklahoma State University.
ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE
ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic
what you need to know
A P Identity u b l i c a t i o n o f t h e S o u t h C a r o l i n a D e p a r t m e n Theft t o f C o n s u m e r A f f a i r s what you need to know Step By Step: What To Do After a Security Breach #1:
According to the Federal Trade Commission (FTC): The FTC is a government agency that promotes consumer protection
According to the Federal Trade Commission (FTC): IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer s personal identification, credit, or account information The FTC is a government
Department of Human Services Client Trust Fund 7290 Trust Accounting System Procedures
Human Services Client Trust Fund 7290 Trust Accounting System Procedures 03.004.00 Effective Date: September 12, 1997 Revised: December 28, 2015 Department of Human Services Client Trust Fund 7290 Trust
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT
THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT Compliments of: Fripp Island Security and FIPOA Security Committee November 2013 1 INTRODUCTION Identity theft is a serious crime. It occurs when your personal
ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE
ELECTRONIC FUND TRANSFERS AGREEMENT AND DISCLOSURE This Electronic Fund Transfers Agreement and Disclosure is the contract which covers your and our rights and responsibilities concerning the electronic
Financial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes
PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit
PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If
Nexus Recycling Management System product summary.
Nexus Recycling Management System product summary. Nexus is an unparalleled application designed to automate the daily routine of processing scale transactions, invoicing customers, and managing employees,
Studio Designer 80 Guide
Table Of Contents Introduction... 1 Installation... 3 Installation... 3 Getting started... 5 Enter your company information... 5 Enter employees... 6 Enter clients... 7 Enter vendors... 8 Customize the
FEDERAL ELECTRONIC FUND TRANSFER DISCLOSURES
FEDERAL ELECTRONIC FUND TRANSFER DISCLOSURES IMPORTANT INFORMATION for our customers who have authorized electronic fund transfers: The Federal Electronic Fund Transfer Act and regulations adopted thereunder
PC Connect Agreement & Disclosure Receipt of Disclosures Equipment Requirements Definition of Business Day
PC Connect Agreement & Disclosure This agreement provides information about the Sutter Community Bank PC Connect Online banking service and contains the disclosures required by the Electronic Funds Transfer
Identity Theft Grade Level 10-12
Identity Theft Grade Level 10-12 Take Charge of Your Finances Materials provided by: Karen Dawson, Family and Consumer Sciences Educator, Skyview High School, Billings, Montana Time to complete: 75 minutes
I dentity theft occurs
1.3.1.F1 Identity Family Economics and Financial Education W h at i s I d e n t i t y T h e f t? I dentity theft occurs when someone wrongfully acquires and uses a consumer s personal identification, credit,
Spotting ID Theft Red Flags A Guide for FACTA Compliance. An IDology, Inc. Whitepaper
Spotting ID Theft Red Flags A Guide for FACTA Compliance An IDology, Inc. Whitepaper With a November 1 st deadline looming for financial companies and creditors to comply with Sections 114 and 315 of the
Cash & Check Handling Policy
Cash & Check Handling Policy Effective Date: October 27, 2006 Revised Date: October 31, 2011 Policy Statement This policy sets requirements for the collection and secure processing of coin, currency, checks,
Ontario Disability Support Program Income Support Directives
Ontario Disability Support Program Income Support Directives 4.4 Transfer of Assets for Inadequate Consideration Summary of Policy The Director shall determine that an applicant is not eligible for income
