By : Captain Rick Ollic Berkeley County Sheriff’s Office.

Slides:



Advertisements
Similar presentations
Banking Services AVAILABLE FOR A SMALL BUSINESS. BANKING SERVICES 2 Welcome 1. Agenda 2. Ground Rules 3. Introductions.
Advertisements

GCSE ICT By the end of this session, you will be able to: Explain main features of ATM machines Identify features of credit cards, debit cards, smart cards.
Pay card Solution-DPS Paperless Payroll
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
C6 - 1 Learning Objectives Power Notes 1.Basic Accounting Systems 2.Internal Control 3.Controls Over Cash 4.Internal Control of Cash Receipts 5.Internal.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
1.7.2.G1 © Family Economics & Financial Education – Revised February 2008 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Module 5: financial services review
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
C7 - 1 Learning Objectives 1.Cash and Cash Controls 2.Internal Control of Cash Receipts 3.Internal Control of Cash Payments 4.Bank Accounts: A Cash Control.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 16.1 Chapter 16 Returns day books.
© Copyright IBSP – IBSP Hong Kong Ltd Internet Business Service Provider.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Bank On It Personal Finance Unit. Why Learn About Banking?
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Security, Privacy, and Ethics Online Computer Crimes.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Chapter 4 Billing Schemes.
Business Math Chapter 8.
Introduction to Business Organisations
Reporting and Interpreting Sales Revenue, Receivables, and Cash Chapter 6 McGraw-Hill/Irwin © 2009 The McGraw-Hill Companies, Inc.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
C7 - 1 Learning Objectives Power Notes 1.Cash and Cash Controls 2.Internal Control of Cash Receipts 3.Internal Control of Cash Payments 4.Bank Accounts:
Bank On It 1. 2 Purpose Bank On It : Is an overview of banking services. Will help you build a positive relationship with banks, thrifts, and credit unions.
1.7.2.G1 © Family Economics & Financial Education – Revised May 2009 – Financial Institutions Unit – Electronic Banking Funded by a grant from Take Charge.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Basic Accounting Course YESCO 2009 Office Managers Conference.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Be Cautious of Identity Theft By: Sydney Langley.
OH 9-1 Protecting Revenue 10 OH 9-1. OH 9-2 Learning Objectives After completing this chapter, you should be able to: Identify and explain the three parts.
ICT and Banks Banks use mainframe computers to maintain customer accounts. They store a record of each customer’s withdrawals and deposits. Each bank mainframe.
Reporting and Interpreting Sales Revenue, Receivables, and Cash Chapter 6 McGraw-Hill/Irwin © 2009 The McGraw-Hill Companies, Inc.
Understanding and Preventing.  Acquiring someone’s identifying information and impersonating them for gain.
Identity Theft. Inform Police and Postal Inspector Contact bank and ask to have account flagged Call credit card fraud units – Register a Fraud Alert/Victim.
What’s Next? Checking and Savings Accounts. Opening a Checking Account Name some items you should bring with you to open a checking account.   Identification.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Unit 9: Electronic Fraud Professor Thomas Genovese.
Marketing Math Chapter 16. Functions of a cash register Record sales Record sales Store cash and sales documents Store cash and sales documents Provide.
Chapter 6 Payroll Schemes.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
GOALS BUSINESS MATH© Thomson/South-WesternLesson 3.2Slide 1 3.2Electronic Banking Record electronic banking transactions Find account balance when banking.
Building: Knowledge, Security, Confidence Check It Out FDIC Money Smart for Young Adults.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
7-1 FRAUD, INTERNAL CONTROL, AND CASH 7 Remember… people will lie, cheat and steal! Not everybody…. and not all the time.… but they do….
More bankingChecks, etc. Check types ServicesMisc. Banking Banking Services Game.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Using Bank Services Chapter 33. Checking Accounts A customer deposits money in an account and receives a book of checks. May deposit or withdraw money.
Identity Theft. What Is Identity Theft? – Acquiring someone’s identifying information and impersonating them for gain.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Protection of CONSUMER information
Open, Manage, and Reconcile
QuickBooks Features and Benefits QuickBooks is Intuit Inc.’s set of software solutions designed to manage payroll, inventory, sales and other needs of.
Take Charge of Your Finances
Take Charge of Your Finances
Presentation transcript:

By : Captain Rick Ollic Berkeley County Sheriff’s Office

 Stealing Money or Goods  Falsifying checks or payroll, including creation of phantom employees  Misusing company credit card accounts  Taking Bribes or Kickbacks from suppliers or customers  Claiming overtime when it is not due  p.1

 Embellishing expense accounts  Providing FALSE information about the company to creditors or investors  Stealing and selling company trade secrets  Giving friends or family unauthorized discounts on company merchandise or services  p.2

 Safeguards during the hiring process  Criminal records check  Thorough checks from former employers  Contact references  Record checks for $25.00 through South Carolina Law Enforcement Division could save you thousands!

 Establish Controls 1.All bill pays should be approved by management 2.All invoices approved by management 3.Add signature line to financial statements to include initials and date/time stamp 4.Allow only certain printers to print financial reports 5.Protect against payroll fraud by using direct deposit, regularly checking payroll records and hand-deliver paychecks.

 Antivirus software on all servers, laptops and desktops. (Check Daily and scan weekly)  Stay updated with software and security patches.  Firewall all computers and on networks install network firewalls  Boot Password to prevent access while away from your computer  Virtual Private Network (VPN) wireless networks

 Always try to run transaction as a debit  When running as a credit always get a picture identification  If transaction is not approved do not complete the sale  Credit or Debit cards by phone always get 3-Digit security number on reverse side  ASKING QUESTIONS NOW CAN SAVE FROM CHARGEBACKS IN THE FUTURE!!!

 Show employees safety features on checks 1) Watermarks and micro printing 2) Fraud deterrent holograms  Person making purchase or cashing check does not match inquire why that is so!  Ask for two forms of identification  Accurately copy information from identification

 Banknote Detection Pens are not proven method for determining counterfeit money  Become thoroughly familiar with genuine note  All counterfeit bills are investigated by the United States Secret Service  Visit

 Detective Captain Rick Ollic Berkeley County Sheriff’s Office (843) Moncks Corner (843) (ext 4423) Charleston Area (843) St. Stephen