Business Partner Screening

Slides:



Advertisements
Similar presentations
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Advertisements

Red Flags Compliance BANKERS ADVISORY 1 Red Flags Compliance Fair & Accurate Credit Transactions Act (FACTA) Identity Theft Prevention.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
STEP 1 ARRIVAL OF MERCHANDISE AND DOCUMENTATION The merchandise arrives at the broker's terminal on the U.S. side of the border. The commercial invoice.
© Chery F. Kendrick & Kendrick Technical Services.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Social Engineering J Nivethan. Social Engineering The process of deceiving people into giving away access or confidential information Onlinne Phone Offline.
© Chery F. Kendrick & Kendrick Technical Services.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Chapter 4 Billing Schemes.
Sales & Cash Receipts Transactions By David N. Ricchiute
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
What You Need to Know Customer Service 1 08/09/2012.
1 CHAPTER XIII CUSTOMS CLEARANCE  Entry Process of Goods, Types of Entry  Evidence of Right to Make Entry  Entry Documents, Surety  Entry Summary &
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
© Chery F. Kendrick & Kendrick Technical Services.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
R ed F lag R ule Training for the Medical Industry © Chery F. Kendrick & Kendrick Technical Services.
Implementation of Prior Notice. Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (Bioterrorism Act-BTA) Public Law
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 CHAPTER XII SHIPPING DOCUMENTS  Commercial Invoice  Packing List  Ocean Bill of Lading  Marine Insurance Policy  Special Shipping Documents  Pro.
Custom Corporate Consulting and Training Fraud: Detecting and Preventing Presented October 30, 2010 To University of Texas at Arlington Executive MBA Students.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
Chapter 4 Billing Schemes.
By: Bonnie Vo Identity Theft Identity theft is the possession of another person’s personal information for criminal purposes. Identity Theft: What is.
1 CHAPTER XIII CUSTOMS CLEARANCE  Entry Process of Goods, Types of Entry  Evidence of Right to Make Entry  Entry Documents, Surety  Entry Summary &
Automated Manifest System (“AMS”) C. Jonathan Benner Troutman Sanders LLP Washington, D.C. 22 March 2004 Stamford, Connecticut.
AUDITING SALES AND CASH RECEIPTS
FCPA Compliance Conducting Due Diligence on Third Parties November 10, 2015 Introductions: Michelle; how we are here, International Trade intersects.
Copyright 2013 GHSP | A JSJ Company Trade Compliance Working Together to Provide Compliant Documentation.
Protecting Your Assets By Preventing Identity Theft 1.
ACCOUNTING INFORMATION SYSTEMS BASIC CONCEPTS & CURRENT ISSUES Chapter 9 Acquisition / payment process McGraw-Hill/Irwin Accounting Information Systems.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
IDENTITY THEFT Seneca Stairs. #1- Phishing  Phishing is when you get an from someone claiming to be an agency that you have an account in.  They.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
Protecting Your Assets By Preventing Identity Theft
Tablet Press & Capsule Filling Machine Transaction Regulations
Protecting Your Credit Identity
UW Whitewater Procurement Card Program
Acquisition / payment process
CHAPTER XII SHIPPING DOCUMENTS
IT Security  .
SCM Customer Service Operations LB 3
Chapter 4 The Revenue Cycle 1.
Part I: Purchases and Cash Disbursements Procedures
Credit Cards: More Than Plastic
When you get caught for Identity Theft
Ch. 15: Accounting for Purchases and Cash Payments
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Red Flags Rule An Introduction County College of Morris
Acquisition and Expenditure Cycle
Identity Theft Prevention Program Training
Procurement Card Program
Smart Business for eGeneration Companies
Protecting Your Credit Identity
Getting the Green Light on the Red Flags Rule
Smart Business for eGeneration Companies
Presentation transcript:

Business Partner Screening

Business Partner Screening Importer Clients Verify C-TPAT status Internet research Credit checks Business reference verification Original Power of Attorney verified and on file Face-to-face meetings

Business Partner Screening Service Providers Verify C-TPAT status Verify status in other U.S. Government programs Credit checks Business reference verification Security questionnaires Site visits

Red Flags Cannot verify address No physical address given (P.O. Box) Only uses cell phone or fax machine to communicate No face-to-face meeting Unable or unwilling to provide positive identification Changes of point of contact without notice Changes of address without notice

Red Flags Vague invoice descriptions Insistence on single classification for shipment with various types of items or parts Insistence on entering merchandise in ways that do not comply with CBP regulations Consignee or notify party is not identified elsewhere on the shipment documentation Importer of record is not the party that holds the bond No actual manufacturer name or address provided

Red Flags Cash payments Under insured or over insured cargo First time consignee with full container that has a very low/high value History of frequently changing brokers Ask to use CHB’s IOR# and bond to clear cargo Unusual cargo routing Frequently provides misleading or conflicting information

Recommended Screening Steps Insist on physically meeting with the client or representative Document the visits Secure copies of identification Verify legitimacy through applicable state Corporation Commission or other sites Verify client address through internet research Have the client identify what commodity they’ll be importing – Does this seem logical/credible for the business?

Recommended Screening Steps Ask the client about their import history When? Where? What type of goods? If the shipments will report an Ultimate Consignee who is not the Importer of Record (IOR), have the client identify those parties/addresses. If the shipments will be physically received after CBP release at a facility/address other than the IOR or Ultimate Consignee address, have the client identify those details as well as a point of contact.

Recommended Screening Steps Insist that new clients have a Single Transaction Bond if they do not have a continuous bond already Notify CBP of new/suspicious clients and make potential clients aware of the policy Request CBP examination of initial shipment and make potential clients aware of the policy

Identity Theft – Detecting and Reporting Suspicious Activities

Importer Identity Information Company Name Importer Identification Number Supply Chain Business Partners Shipping Documents Purchase Orders Invoices Manifests Commodities and quantities

Acquisition of Sensitive Information Dumpster Diving – Going through garbage cans, dumpsters, trash bins to obtain copies of documents Shoulder Surfing – Watching from a nearby location as you enter data into the computer or read trade sensitive information on your desk Purchase - Criminals buy old/unwanted computers and other electronic devices to troll their hard drives for sensitive information Insider – Employee steals sensitive documents or electronic data and provides it to criminals

Smuggling Goals Evade Detection Ship and obtain clearance of illegal goods Remain anonymous Deal in cash and documentation that can not be traced Establish a smuggling supply chain that is untraceable

Proactive Measures Employees must be trained to report suspicious activity to company management Verification of Power of Attorney (POA) Do you know the customer? Do you know the individual named on the POA? Confirm that customer is legitimate Contact company to verify POA Who has access to company information? Is sensitive information secure after business hours? Cleaning crew – Do you know who they are? Other employees without a “Need to Know” IT disabled after employee separates from company

Proactive Measures Disposal of trade sensitive information Shred paper documents Wipe all files off old computers and electronic devices before getting rid of them Hackers buy such devices for the information stored on them Monitor ACE reports Notify CBP when suspicious activity is identified C-TPAT Supply Chain Security Specialist National Account Manager Port