Fraud Prevention. I am a thief Wouldn’t it be easy if criminals wore labels? Forgery!!!! Or the checks could tell us there is a problem? counterfeit.

Slides:



Advertisements
Similar presentations
Welcome Back to School!!! Mr. Sortina.
Advertisements

On the Telephone! On The Telephone.
COMMUNICATING ON THE TELEPHONE
Telephone Interviews Telephone interviews are a popular way for some employers to reduce the number of face to face interviews that they have for a vacancy.
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Math for Liberal Studies. An identification number is a sequence of letters and/or numbers that identifies an object, person, place, or concept The number.
Detecting, Preventing and Mitigating Identity Theft Presented by the Bursar’s Office.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
{ “Floor” Premier Consignor Three Bags Full Premier Consignor Training Do not copy, share or edit this material.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
Lesson 10: Dealing with Criticism
Roleplaying. Grandma & Money You are 25. You want to borrow 360,000 kuai from your rich grandmother to start a business. You have not seen her in 3 years.
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
Welcome to Crime Prevention Training.
A Practical and Easy Guide to Preventing Loss Retailers Association of MA Loss Prevention Committee.
Store Security. STORE SECURITY Customer Service Acknowledge all customers Make eye contact. A possible robber will think twice if he thinks that he can.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Presented By The Plano Police Department Crime Prevention Unit.
Safety On The Internet Illinois Attorney General’s Office Naperville Police Department.
Sample Check Register. Sample Blank Check Register.
Substitute FAQs SubFinder Overview. FAQs Do I have to have touch-tone service to use SubFinder? No, but you do need a telephone that can be switched from.
Present Perfect and Simple Past (II)
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Opening a bank account.
Check It Out 1. 2 Introductions Instructor and student introductions Module overview.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
7.2 Use Your Checking Account Goals: ◦Understand the purpose of a checking account. ◦Demonstrate how to write, endorse, record, and deposit checks. ◦Identify.
IDENTITY THEFT What it is & how to prevent it. What is identity theft?  Identity theft happens when someone steals your personal information & uses it.
Check It Out 1. 2 Purpose Check It Out will teach you how to use a checking account responsibly.
First, Introduce Yourself. “Hi, I’m ____. Tell me a little more about your home here.” Start walking through the home with them.
9/4/20151 MODALS in the PAST 9/4/20152 can't havecouldcould havecouldn'tcouldn't have didn't need tohad tomay havemay not havemight have might not havemust.
Washington State Department of Financial Institutions “Regulating financial services to protect and educate the public and promote economic vitality.”
How to behave in an job interview Jan Bollen / Job interview.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
What’s the Point of a Cover Letter?  Who can tell me what a cover letter is?  How many of you enjoy writing cover letters?  How many of you struggle.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
AGE OF TECHNOLOGY. 1) Take a look at “What Not to Wear” sheet. 2) Locate the section that deals with Electronic Devices (EDs). 3) Use this sheet as a.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Moving Around in Scratch The Basics… -You do want to have Scratch open as you will be creating a program. -Follow the instructions and if you have questions.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
LISTENING. Kunst entered the induction station shortly after seven? His Wife was blond? His friend was Male? Kunst was refusing to report for induction?
Step 2: Inviting to Challenge Group. DON’T! Before getting into the training, it’s important that you DON’T just randomly send someone a message asking.
Show Me the Money! How to ask for a Raise!. Did You Know? 1.If you ask for a raise and the boss says no, the best thing to do is threaten to quit. 2.Your.
Optimizing Your Computer To Run Faster Using Msconfig Technical Demonstration by: Chris Kilkenny.
Sight Word List.
Isaiah Curry l Devin Brooks THE SIX FLAGS FINAL DESTINATION.
Cover Letter YOUTH CENTRAL – Cover Letters & Templates
Jeff loses his identity! Lesson 8: Identity Theft.
English Grammar in Use could (do) & could have (done) ; must & can’t ; might as well needn't do & needn't have done; should; can & could; if I do & if.
Check It Out 1. 2 Introductions Instructor and student introductions Module overview.
Sight Words.
Prevention of Identity Theft. Why now, Why us? Federal Trade Commission (FTC) regulations for Identity Theft which may not apply, but it is good business.
Updating your Phone Messages. Don’t start with your name first Every phone message starts the same way: “Hi, this is Sharon from Original Works”. When.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
Interview Questions. Top 10 Interview Questions TOP 10 JOB INTERVIEW QUESTIONS ■ How did you fill downtime at your last job? ■ Tell me about your last.
Online Job Applications Workshop Coordinators Sharon Feeney – Andrea Reynolds –
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
Gmail Password Reset Process Do you want to Reset your Gmail account password because your Gmail account password is not secure or easy to guess or your.
Unit 9 Finance and Banking. Electronic Banking What is E-Banking Electronic banking or e- banking gives people electronic access to bank accounts and.
By Brooke Rogers Identity theft is the act of acquiring and collecting a persons information with the intent of using it for criminal purposes. Identity.
Shoplifting Awareness
Protecting Your Identity:
FB 6 Module 3.
Starfish Faculty Training How to Raise Flags and Kudos
Clemson University Red Flags Rule Training
Memory and Learning Our brains are often compared to computers in the way that we process information. We must: Encode, Store, then Retrieve info.
Presentation transcript:

Fraud Prevention

I am a thief Wouldn’t it be easy if criminals wore labels? Forgery!!!! Or the checks could tell us there is a problem? counterfeit

Well….they don’t BUT if you ….. Pay attention to details (Five little words to remember…..) You might see some clues that make you think something isn’t quite right.

So – why did you need to get here early to listen to me tell you to…. Pay attention to details (Five little words to remember…..) Recently we lost almost $19,000 in two days! On another occasion we lost almost $2,000 in 10 minutes…. What happened is over and done. It could have occurred at any office, to any teller…lets learn from these incidents so we can prevent these losses in the future.

What happened… This check was presented by the person in the photo at about 3:20 p.m. at East Brook on Wednesday, June 13.

At the next teller station, this check was being presented…. Note that these checks are from a Machine Products Company, but the presenters are dressed as construction workers…..

Look how far apart New Berlin is from Eastbrook…..

At about 3:45, this check was presented by the individual in the picture….

And at the next window over, this check was being presented…..

Pay attention to details Five little words to remember The following day, two more checks – one for $4, and one for $4, were presented by the following two people:

Things were going so well, MORE checks were presented, however, Eastbrook teller ********* didn’t think something seemed right…. The person in this photo was arrested on site The person in this photo grabbed his check and left No one noticed that our bank name was spelled incorrectly…several tellers noted that all the suspects were on foot, not necessarily normal for East Brook customers. We lost $18, due to this group.

Does it make sense???? Parked in the farthest spot when closer ones are open OR are they dropped off Maker/Business type versus payee and amount Identification is newly issued; was it in their wallet or pocket? Have you seen these checks before? How far away is the business from your office? Is the amount of the check reasonable for the payee/situation?

Red Flags Look at the check Are there spelling errors Address errors Erasures or alterations Maker signatures in markers Maker signature that looks “drawn” Does the endorsed name match the payee name? Look at checks from last week or last month, are they the same?

Decide IF you want to complete the transaction before starting it! Pay attention to details Five little words to remember How can you be sure a check presented to you is not a counterfeit or forgery? CALL THE MAKER AND ASK What phone number do you use when calling? THE NUMBER ON YOUR CIF SYSTEM

ITS NOT LEGIT…NOW WHAT? CALL ?????? OR ?????????? –Try to detain the suspect –Try to keep the check –Try to remember the name, address, ID type –Try to see what car they are in/driving –Try to notice accomplices I will advise you if you should contact the police – I will begin pulling video, freezing the account and reviewing the activity for other fraud

Plan B IF you can’t reach me, and the maker has POSITIVELY stated the check is a forgery or counterfeit –Call your local police department on the non- emergency number –Tell them you have a fraud in progress –Stay on the line and answer their questions –Observe the suspect so you can provide a good description

So…it took too long and he left That is a CLUE!!! Now what???? –Pass the check around so everyone can see it? NO! I don’t want your fingerprints on it! –Run after the suspect and give him his check back? NO! NEVER chase a suspect, and we don’t want him to have the check. –Call me to get Security Alerts out and get holds on the account? YES –If I’m not available, get a hold on the account immediately –Review the activity for other fraudulent transactions –Complete an Unusual Incident Report and document as much as you can. Pay attention to details Five little words to remember

PAY ATTENTION TO DETAILS The FOUR little words to remember! If it doesn’t seem right….ask questions