Credit Card Fraud. Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not.

Slides:



Advertisements
Similar presentations
An Educational Partnership of Consumer Action and Chase
Advertisements

OVER VIEW OF BANKING FRAUDS
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Protecting Your Identity: What to Know, What to Do.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 7.2 October 24, 2011.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Identity Theft INDEPENDENT LIVING: MANAGING YOUR MONEY.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 13-1 Today’s Topics n Consumer Fraud.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
The ins and outs of By: Megan Tucker. What is identity theft? The stealing of a person’s information, especially credit cards and Social Security Number,
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Checking Account Debit Card Safety Tips card-safety-10-tips.htm October.
Fraud.
CREDIT CARD FRAUDS. Objectives Identify and describe examples of Credit Card frauds. List ways to protect yourself from Credit Card fraud in card present.
Protect Yourself from Identity Theft
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
SIMPLE AND COMPOUND INTEREST Since this section involves what can happen to your money, it should be of INTEREST to you!
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
By: Mrs. McGinnis Sept,  Fradulent online shops  Sites that distruibute pirated music, videos and software  Bogus charity websites  Sites that.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
CREDIT CARD FRAUD. TYPES OF CREDIT CARD FRAUD Counterfeit credit card use. Card lost or stolen by the card holder. Fraud committed without the actual.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
Be Cautious of Identity Theft By: Sydney Langley.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
IT Banking Advantages and Disadvantages. Advantages IT banking is faster and more convenient for the user as they no longer are required to be at the.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Identity Theft How it happens and how to avoid it.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Computer Vulnerabilities & Criminal Activity Identity Theft & Credit Card Fraud 6.1 March 1, 2010 Identity Theft & Credit Card Fraud 6.1 March 1, 2010.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Identity Theft!!! Bill Ketjen Matt Grodhaus Two forms of crime IDENTITY THEFT  Using personal information for deception IDENTITY FRAUD  Using personal.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Chapter © 2010 South-Western, Cengage Learning Responsibilities and Costs of Credit Using Credit Wisely Costs of Credit 18.
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
Frauds, Scams and Slams: Credit Card and ATM Fraud Prepared by Dr. Jan Park Gerontology Specialist Oklahoma Cooperative Extension service April 2002.
Chapter 18 Responsibilities and Costs of Credit. Lesson 18.1 Using Credit Responsibly Responsibilities of consumer credit Responsibilities of consumer.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Protecting Your Assets By Preventing Identity Theft
Identity Theft It’s a crime!
When you get caught for Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
A Secret Service Perspective on Credit Card Fraud
Presentation transcript:

Credit Card Fraud

Credit card fraud - situation when an individual uses another individual’s credit card for personal reasons while the owner is not aware of this fact

Credit card frauds are committed in the following ways: an act of criminal deception by use of unauthorized account or personal information illegal or unauthorized use of account for personal gain misrepresentation of account information

Modus operandi for credit card frauds: lost or stolen card - 48% identity theft - 15% skimming - 14% counterfeit card - 12% phishing - 6% other - 5%

Stolen most issuers have 24 - hour telephone numbers unauthorized purchases until it canceled

Identity theft social security or driver’s license numbers false credentials for immigration attributed to the victim account takeover true name theft

Scimming illegal copying of information from the magnetic strip of a credit card fake or ‘cloned’ card with your details on it borrowing money and taking out loans

Phishing massive numbers of phony s to consumers s look legitimate victims are directed to a fake web site

The 9 million world-wide bank robbery

Sergei Tšurikov (Estonia) found a path of entry into the RBS computer network Managed an existing ring of cashiers Distributed fraudulently obtained debit card account numbers and PIN codes Hacking rings raised the accounts limits on compromised accounts 44 counterfeit payroll debit cards

Be careful!

Destroy your expired cards Immediately sign new cards Don’t keep your PIN in your wallet Treat credit cards as if they were real money Lost or stolen cards should be reported immediately Be cautious when giving information to websites or unknown individuals Verify transactions on your statement with your receipts Keep an eye on the credit card when making transactions in shops Don’t sign a blank credit card receipt Don’t borrow your cards Guidelines to protect yourself from credit card fraud: