How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Section 5.1: Selecting Financial Services and Institutions
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Are You Ready? Identity fraud and identity management are quickly becoming critical operational concerns for the financial industry. The Red Flags Guidelines.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Consumer Issues Chapter 28.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
CARD ACCEPTANCE PROCEDURES Facilitator: Kristy A Stanley Fraud and Compliance Officer June
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Chapter 19 Protecting E-Commerce systems. Is IT different? There is some discussion that IT today is no different than past enabling technologies Telegraph.
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Banking in the United States. Banking Safety FDIC is the Federal Deposit Insurance Corporation On May 20, 2009, President Obama signed the Helping Families.
17-2 Financial Services and Electronic Banking. Types of financial services Savings services Financial institutions accept money for safekeeping. A broad.
Learning About Credit Advantages and Disadvantages.
BZUPAGES.COM Electronic Payment Systems Most of the electronic payment systems on internet use cryptography in one way or the other to ensure confidentiality.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Confidential and proprietary to U.S. Bank 1 Corporate Payment Systems Adwebportal Training.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
2015 ANNUAL TRAINING By: Denise Goff
© Oklahoma State Department of Education. All rights reserved.1 Credit Cards: More Than Plastic Standard 8. 1 Credit Cards and Online Shopping.
Understanding the Fair and Accurate Credit Transaction Act, the “Red Flag” Regulations, and their impact on Health Care Providers Raising a “Red Flag”
Britannia/NET1 Web Seminar 2007 Presented By: NET1 Payment Solutions Presenter: Brian Morabito.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
© Family Economics & Financial Education – Revised October 2004 – Credit Unit –Understanding Credit Reports Funded by a grant from Take Charge America,
1.4.2.G1 Credit Reports and Credit Scores Take Charge of Your Finances.
Accounting & Financial Analysis 111 Lecture 8 Source Documents, Day accounts/Specialised Journals, Debtors & Creditors Subsidiary Ledgers.
Jeff loses his identity! Lesson 8: Identity Theft.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Accounting & Financial Analysis 1 Introduction to Accounting.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
Credit Cards. When thinking of getting a Credit Card follow the Three C’s: Character: Will you repay the debt? How you used credit before? Do you pay.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Teens lesson eight credit cards presentation slides 04/09.
Fraud, scams and commercial exploitation. The dangers Children are still generally quite trusting and uncritical about what they read online They are.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
Enforcement via Policies and Procedures. Processes and Procedures These are boring, tedious, time consuming…… BUT THEY ARE ESSENTIAL They must be written.
© Take Charge America Institute – September 2008 – Workshop Guide – Understanding Credit Reports Advanced Funded by a grant from Take Charge America, Inc.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Banking in the United States. U.S. Banking System Overview  The Federal Reserve System is the central banking system of the United States.  Regulates.
Protecting Your Assets By Preventing Identity Theft
What’s a Credit Score? And how to use credit wisely.
Identity Theft It’s a crime!
Regular Payments First and Subsequent Payments
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
Credit Cards: More Than Plastic
Depository Institution Essentials
Depository Institution Essentials
Protecting Yourself from Fraud including Identity Theft
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Depository Institution Essentials
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Getting the Green Light on the Red Flags Rule
Presentation transcript:

How to Manage Risk

This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any other organisation that applies for a facility or product Application Processing

What is involved in the process You basically collect as much information about the person as possible Name Address ID Number Dependents Salary Employer Etc: Application Processing

Why To be able to make the best decision possible on the viability and value of this customer to you as a provider of services To be able to identify where this person or organisation is at this time to be able to support marketing of products and cross selling to that individual or organisation And To comply to the National or International requirements that you are subject to as an Issuer or an Acquirer Application Processing

Application Fraud has been one of the major growth areas in fraud in many countries in the last few years The fraudster obtains enough information about a person or company to allow them to make a fraudulent application for a card, loan, mortgage etc: The fraudster then takes the money in a loan and disappears or uses the card to its maximum credit limit. Fraudsters have used information obtained on existing individuals, dead people and so on with high levels of success. Application Fraud

Credit scoring is where a central organisation holds information on individuals and companies to allow Banks to obtain a score on the validity of the applicant for a card, loan etc: The database holds Current account statuses Defaults Court Judgements Electoral Rolls Anything that relates to people and companies Credit Scoring

Where they exist they are very valuable and are heavily used But they can be a problem when data is: Incorrect Wrongly applied to a person or company Malicious data has been provided and used Old and out or data is not removed In many countries now you have the right to see the data held on you and to be able to correct it with the right evidence. A small fee is normally charged. Credit Scoring

All banks have credit risk parameters and profiles in place for all products In the past they have been ignored and overridden, a good example was sub-prime mortgages in the USA. Credit Risk Policies must be updated on a regular basis and must be adhered to in all cases. In the US credit card companies ignored their Credit Risk policies in the 10 – 15 years up to 2008, and they very nearly had a sub-prime credit card problem But now Credit Risk is applied strictly and that problem has been avoided., Credit Risk

When you sign up a merchant or a company you have to go through a number of required checks: Visa VMAS and MasterCard Match fraud databases Company house checks UN Sanctions List Company accounts validity If all of these are not passed you cannot set up an acquiring relationship with a merchant or a corporate account with a company Scheme Risk Processes

KYC – Know Your Customer and KYB – Know Your Business are now strictly enforced by the Financial Services Agencies or Central Banks in a country. This involves seeing: Passport / ID card Utility Bill Bank Statements Company Accounts And in companies can be applied to all directors of a compnay. KYC / KYB

Risk Profiling is a process that allows you to measure a profile for any element in a product, including: Profitability Credit Limits Authorisation Limits Collections potential Applicant profile Product potential Used properly it is possible t effectively manage portfolios at a detailed level. Risk Management Profiling

Card Risk is one of the highest risks in banking at this time. Whether its an application, limit increase, over limits authorisation - anything The fraudsters know and understand these areas in detail and will exploit any gap or weakness they see Processes, procedures, policies are all needed to guide staff in these areas and allow then to make the right and approved decisions in any area. These are supported by fraud monitoring systems and automated rules But all of the above must be applied to make it work effectively to prevent and stop many frauds Managing Card Risk

It does work If as an organisation you don't apply it you will: Be hit by fraud and losses The regulators will become involved and will demand explanations Your business can be curtailed or stopped completely And then you will be heavily controlled in any future product launch, market expansion etc: Does this work and How does it Affect Your Organisation

Watch out for patterns indicating: 1. Purchase a large amount of merchandise without regard to size, style, colour, or price. 2. Ask no questions on major purchases. 3. Try to distract or rush you during the sale. 4. Make purchases and leave the store, but then return to make more purchases. 5. Make large purchases just after the store’s opening, or as the store is closing. 6. Refuse free delivery for large items. Six Warning Signs of Fraud

1. First-time shopper 2. Larger-than-normal orders 3. Orders that include several of the same item 4. Orders made up of “big-ticket” items 5. “Rush” or “overnight” shipping 6. Shipping to an international address 7. Transactions with similar account numbers 12 Potential Signs of CNP fraud

8. Shipping to a single address, but transactions placed on multiple cards 9. Multiple transactions on one card over a very short period of time 10. Multiple transactions on one card or a similar card with a single billing address, but multiple shipping addresses 11. In online transactions, multiple cards used from a single IP (Internet Protocol) address 12. Orders from Internet addresses that make use of free e- mail services 12 Potential Signs of CNP fraud

Do not click on attachments that you do not recognise Be suspicious of return addresses Be suspicious of messages Be suspicious of web links Don't download or install anything that you are sure what is it Update Internet Explorer with anti-phishing tools Report Phishing Educate consumers: Phishing Educate consumers: Phishing

Keep your personal information secure Keep all your plastic cards safe Keep your documents safe Keep your passwords and PINs safe Protecting the identity of deceased family members Educate Consumers: Protect your identity