Cash Bag. Purpose The primary purpose of the Cash Bag is to deter property theft of valuables or vital documents through a GPS tracking device. Secondary.

Slides:



Advertisements
Similar presentations
Secure Your Store Understand the measures used in securing a retail store.
Advertisements

Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
FRAUD PREVENTION TRAINING FRAUD PREVENTION TRAINING.
Identity Theft Ta’Mar Boyd Adam Devin. What is Identity Theft  Identity theft occurs when someone uses your personally identifying information, like.
Identity Theft …It could be you But This Presentation is by me, Michelle Richards.
Friday June 6, 2014 OBJ: SWBAT understand what identity theft is, what the consequences are, and how to prevent it. Drill: What statement is this cartoon.
Lesson 8.5 Identity Theft July 2011Copyright © … REMTECH, inc … All Rights Reserved1 Introduction Identity theft occurs when someone steals some.
Protecting Your Identity: What to Know, What to Do.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protecting Yourself from Fraud including Identity Theft
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Operation Shield Partnership Briefing. What is it? Operation Shield is a forensic property marking initiative that launches in Cheshire on 2 nd March.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Mobile Phone Theft. Serving our communities and protecting them from harm Introduction Mobile Phone Theft There were an estimated 742,000 victims of mobile.
Beware! Consumer Fraud Module 9.1.
Have You Lost Your Identity? By Sierra Bowland. Deter Detect Defend.
WHO’S IN YOUR “WALLET” WHO’S IN YOUR “WALLET” YOU BETTER “RECOGNIZE” YOU BETTER “RECOGNIZE” STEPPING $200 $200 $300 $400 $500 $400 $300 $200 $500 $400.
Who Is This?! By Bailey Hoover. Foreword Deter Detect Defend Deter, Detect, Defend Brochure ID Theft: What It’s All About.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION HOW TO TRAVEL SAFELY WHILE ON BUSINESS.
Preventing Financial Exploitation of Vulnerable Adults in Missouri Preventing Financial Exploitation of Vulnerable Adults in Missouri Missouri Department.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
Company LOGO Product Development BMI3CMr. Whiler.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Children’s Hospital Requirements for Remote Access.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
The State of Computer & Data Security in Corporations Independent Survey.
Red Flag Rules Identity Theft Prevention Tips for Ambulance Personnel -
MAJOR SERVICES PROVIDED  PATROL CAMPUS  EMERGENCY MANAGEMENT  SAFETY ESCORTS  ENFORCE POLICIES/LAWS  ACCESS.
CASSIUS BOOTH cell # (510) Ca$h Bag. Virtual Prototype of Ca$h Bag.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
By: Asfa Khan and Huda Mukhtar
Jeff loses his identity! Lesson 8: Identity Theft.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
The Design Process.
Conversion of Benedict College Student Records By Kareemah Dennis October 12, 2015.
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Fit For Duty Recovery v. Prosecution Medical Law LDR 650 Karin Newsom Lori Reau Kelly Scott.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Marketing Marketing Indicator 1.05 Indicator 1.05.
This Is Just The Beginning Confidential Investor Presentation April 2016.
By Amanda Cowan.  When another person steals your information and uses it to commit fraud or other crimes  The information stolen can be:  Credit Card.
FAMILY VACATION. Fun & Safety Planning a family vacation? Whether your destination is Disney World, Denver, or Denmark, there are certain things you need.
Acceptable Use Policy (AUPs) and $40 Insurance Fee
Protecting Yourself from Fraud including Identity Theft
Economic Abuse & Financial Exploitation in later life
Protecting Your Identity:
The Benefits of Two License Plates and the Costs of Removing One
2017 TCS SMT Training - Dallas
Choosing the Best Locks for Your Gym Locker or Employee Locker Call:+44 (0) Mail:
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Block Leader Presentation 2019
IDEA LAPTOP PROGRAM Your Role and Responsibility as a Parent of a IDEA Student.
Move this to online module slides 11-56
Identity Theft By Kerry Freeman, EA.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Cash Bag

Purpose The primary purpose of the Cash Bag is to deter property theft of valuables or vital documents through a GPS tracking device. Secondary purpose to monitor locations of minors or cognitively impaired individuals, who carry back packs, purses brief cases, luggage's, golf bags etc.

Background Information Due to theft of purses, lap top bags, brief cases important vital personal information or business items can be lost. The primary idea of the Cash Bag is to allow for tracking of the stolen items. Right now the way these issues are addressed is normally victims will accept their loss, or go through a cumbersome process of filing police report, or identity theft protection with the credit bureau. The Cash Bag can also be used as a tracking device to monitor the location of minors, when you are not able to locate them via alternative communications.

Solution: Cash Bag

Dimensions

Details of the Cash Bag

Backpack straps

Remote control

Benefits of Cash Bag Combination locking system GPS locator (to locate loved ones who may be lost) Remote control to lock, unlock and track with GPS Bag production will be completed using high quality material: such as Kevlar Bag doubles as a backpack, purse and laptop bag

Consumers Attorneys CEO’s Health Care Professionals (Physicians, Nurses, Socials Workers, Administrative etc.) Parents (children who carry back packs) Elderly with Cognitive Impairment

Why Now Secured locks and GPS bags can prove to be beneficial. For example in 2010 during a robbery, one lady was able to locate her purse within 10 minutes of the theft. A lady was robbed, in SF while walking. After her robbery she immediately ran back to the office only to recall that she threw the GPS tracking device in her purse, called the police who in return arrested the robber and recovered her stolen items. (GPS Tracking Info, July 2010)

Comparison To Current Products Out On The Market Currently no products exist in the market that have a GPS tracking device secured in carrying bags. Tracking devices can be purchased separately and placed into the bag. However, these existing products do not guarantee, that this device will not be easily visible by the thieve and thrown away.

Revenues The pricing structure is under development pending manufacturing of prototype which will yield actual production cost.

Potential Future of Cash Bag The current design serves as a backpack, purse and laptop bag, but the future of this bag would be to make a bag that served more functions or a different bag for each purpose, i.e. tool bag, gym bag, golf club bag, luggage, brief case, armor/bank bags, law enforcement bags, Patent pending number