By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.

Slides:



Advertisements
Similar presentations
An Educational Partnership of Consumer Action and Chase
Advertisements

Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
Lecture 3 Title: Online Payment: Credit Card and PayPal
Fraud Protection. Agenda Start time: ____ Break time: ____ (10 minutes) End time: ____ Please set phones to silent ring and answer outside of the room.
1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
MoneyWi$e: ID THEFT & ACCOUNT FRAUD ID Theft & Account Fraud Prevention and Clean Up.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
© 2005 Convio, Inc. NTEN Webinar: Protecting your organization and donors from online scams February 23, 2006.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
1 Identity Theft and Phishing: What You Need to Know.
©2005 Qwest Communications International, Inc. NOTE: Qwest is providing the above information as a customer service for educational purposes only. Qwest.
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Georgia Department of Labor IDENTITY THEFT Presenter: Racquel Robinson.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
CREDIT CARD FRAUDS. Objectives Identify and describe examples of Credit Card frauds. List ways to protect yourself from Credit Card fraud in card present.
What You Need to Know Customer Service 1 08/09/2012.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
A ID Theft & ACCOUNT FRAUD Welcome to MoneyWI$E A CONSUMER ACTION AND CAPITAL ONE PARTNERSHIP Prevention & Clean Up © 2011.
E-commerce Fraud: The New Reality Thomas Chim Raj Nair Chris Geegan Mike Grimsley.
U.S. SECRET SERVICE “Worthy of Trust and Confidence” !!! SCAMS !!! $$$ SCAMMER KNOW WHAT TO LOOK FOR.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
1 FSAIF – Florida Seniors Against Investment Fraud Provided by:
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Wire Fraud. Prevention Avoid sending sensitive financial information via . Use encrypted . Educate clients about fraud. Contact the intended.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Identity Theft Project Erin L. Caraway Jacob Locke.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Phishing Dennis Schmidt, CISSP Director, Office of Information Systems HIPAA Security Officer UNC School of Medicine UNC School of Medicine.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Section 5: Identity Theft.  Prevent myself from becoming a victim of fraud  If I become a victim of fraud, I will know what to do!
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Paypal PayPal is an e-commerce business allowing payments and money transfers to be made through the Internet. With a PayPal account, you can send and.
Fraud Protection.
Fraud protection.
Phishing, identity theft, and more
When you get caught for Identity Theft
How to Protect your Identity Online PIYUSH HARSH
Information Security Session October 24, 2005
Protecting Your Identity:
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Protecting Your Credit Identity
What is Phishing? Pronounced “Fishing”
Presentation transcript:

By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention

What is credit card fraud? Credit card fraud is theft and usage of another persons credit card for an unauthorized transaction. The purpose may be to obtain goods or services without paying, or to obtain unauthorized funds from an account.

Credit Card Fraud By the Numbers IC 3 (Internet Crime Complain Center) reports that there were 275,284 complaints of internet crime around the country, of which only 72,940 cases were investigated by law enforcement. Total dollar loss from all reported cases of fraud was $264.6 million. (74.0%) and web pages (28.9%) were the two primary mechanisms by which fraudulent contact took place. Individual Complaints Individual Perpetrators Top Countries by Perpetrators California 14.6%California 15.8%United States 66.1% Texas 7.2%New York 9.5%United Kingdom 10.5% Florida 7.1%Florida 9.4%Nigeria 7.5%

2008 Top 10 IC 3 Complaint Categories

Popular Scams of 2008 Fraudulent unsolicited s to commit identity theft. FBI fraud s. Lottery Scam Unauthorized access to your personal address, and the fraudster sending phony distress s to your contacts. Overpayment Scam Roommate scam Ebay Scams No delivery or receiving inferior products

Merchant Prevention (Online) CVV/AVS Verification Ship to bill Call credit card company to verify information. Call billing number to confirm order IP Address Red flagging bad orders Database of all bad orders linking to any matching new order if information is identical. Release form Additional documents Small charge verification Calculating the level of risk based on the above factors

How your credit card company helps 24/7 Online and Telephone support View pending transactions Locking your credit card after suspicious activity Data mining can help define and determine suspicious activity Call notification

What you can do to help prevent fraud. Dont give your credit card info online unless the website is secure. Make sure the site is reputable/legitimate source. Check the BBB for previous complaints. Use Paypal if possible. Shred all credit card receipts and sensitive documents. Enroll in a credit report service Freecreditreport.com Password database program KeePass