SlideShare a Scribd company logo
1 of 16
1
CREDIT CARD FRAUDS
Lost or Stolen Card – 48%
Identity Theft – 15%
Skimming – 14%
Counterfeit Card – 12%
Phishing – 6%
Other – 5%
2
Stolen
Identity Theft
Skimming
Counterfeit
Phishing
Other
Stolen Identity Theft Skimming Counterfeit Phishing Other
STOLEN CARDS
• When a credit card is lost or stolen, it may be used for illegal
purchases until the holder notifies the issuing bank and the bank
puts a block on the account.
• It is possible for a thief to make unauthorized purchases on a card
before the card is canceled.
3
ID THEFT
• Application fraud
Application fraud takes place when a person uses stolen or fake
documents to open an account in another person's name. Criminals
may steal documents such as utility bills and bank statements to build
up useful personal information. Alternatively, they may create fake
documents. With this information, they could open a credit card
account or loan account in the victim's name, and then fully draw it.
4
ID THEFT
• ACCOUNT TAKEOVER
An account takeover occurs when criminals pose as a genuine customer,
gain control of an account and then makes unauthorized transactions.
A fraudster uses parts of the victim’s identity such as an email address to
gain access to financial accounts. This individual then intercepts
communication about the account to keep the victim blind to any threats.
5
ID THIEVES HARM VICTIMS BY-
Using their names and other personal information to open new credit
accounts.
Accessing existing credit and bank accounts to make unauthorized
purchases.
Victims of ID theft are not held liable for losses, but it takes time and
effort for victims to prove fraud and clean up the chaos.
6
SKIMMING
7
When any person make illegal
copies of credit or debit cards using a
“skimmer” device that captures credit
card numbers and other account information.
The stolen credit information is used to make
purchases by phone and internet, or
to make counterfeit cards.
PHISHING
• Phishing is a financial crime that starts with
massive numbers of deceptive spam e-mails.
• These e-mails look like they come from your
bank.
• But they are just a trick to get account numbers
and passwords.
• Refer section 66 of Information Technology
Act 2000.
8
 PROTECT YOUR ACCOUNT NUMBERS
• Never write your credit card number on post cards or on the outside of
envelopes.
• Never provide your card number on the phone, unless you know it’s a
legitimate, reputable business.
• Never give your account number to anyone who calls you on the phone
or sends you an e-mail.
9
PRECAUTIONARY MEASURES TO AVOID
CREDIT CARD FRAUDS
 INTERNET SAFEGUARDS
• Avoid providing your credit card number to websites offering “free
access”.
• Install a firewall in your computer to prevent unauthorized access from
hackers.
10
 WATCH YOUR CREDIT CARD
• Watch closely when store or restaurant employees handle your
card to make sure they are not copying or “Skimming” your
credit card number.
• After you make a purchase and your card is handed back to you,
make sure the card is yours.
 PROTECT YOUR WALLET OR PURSE
• Keep a close eye on your belongings.
• Never carry all your credit cards.
• Bring only the 1 or 2 cards you might need.
• Carry your credit cards separate from your wallet.
• If your wallet or purse is lost or stolen, call your credit card issuers
immediately.
11
 BILLING STATEMENTS
• Review credit card statements closely on the day they arrive.
• Report any questionable charges to your card issuer immediately.
• A missing credit card statement may indicate stolen mail.
Contact your card issuer right away if your bill doesn’t arrive around the
usual date.
• If you have a computer, consider signing up for online account access.
This way you can track your account activity between statements.
12
 IN CASE YOUR CARD IS LOST OR STOLEN
Record all your account numbers and company contact
information and keep the record in a secure place.
That way you can easily find whom to call to report the loss.
Never write down your personal identification number (PIN).
Never give your PIN to anyone.
13
REPORTING CREDIT CARD FRAUD
To report credit card fraud
 Inform your bank about the unauthorized transaction as soon as possible, maximum
within 3 days of occurrence. You can inform by contacting them via Toll Free number,
customer care number, phone banking, SMS, email, or by visiting any closest branch of
the same bank
Banks’ loss and fraud reporting system will immediately acknowledge your complaint
and share a registered complaint number for your reference to keep a track of further
developments.
14
15
Source – Livemint.com
THANK YOU
16

More Related Content

What's hot

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionanthonytaylor01
 
Atm frauds
Atm fraudsAtm frauds
Atm fraudsGPERI
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Audrius Sapola
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learningwgyn
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?Rambus Inc
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryAsad Hameed
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologySabrina Kirrane
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudJason Sookram
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 

What's hot (20)

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity theft
Identity theftIdentity theft
Identity theft
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Atm frauds
Atm fraudsAtm frauds
Atm frauds
 
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
Telephone fraud PPT for Fraud Conference at Portsmouth University, 2014
 
Detecting fraud with Python and machine learning
Detecting fraud with Python and machine learningDetecting fraud with Python and machine learning
Detecting fraud with Python and machine learning
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Preventing Bank's Fraud and Forgery
Preventing Bank's Fraud and ForgeryPreventing Bank's Fraud and Forgery
Preventing Bank's Fraud and Forgery
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Skimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card FraudSkimming: Review of Credit & Debit Card Fraud
Skimming: Review of Credit & Debit Card Fraud
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 

Similar to Credit card frauds

How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraudshreemala1
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraudscamtools
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Credit card scams
Credit card scamsCredit card scams
Credit card scamsscamtools
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation nickski51
 

Similar to Credit card frauds (20)

Credit Card Fraud
Credit Card FraudCredit Card Fraud
Credit Card Fraud
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Credit_Card_Fraud.ppt
Credit_Card_Fraud.pptCredit_Card_Fraud.ppt
Credit_Card_Fraud.ppt
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit_Card_Fraud.ppt
Credit_Card_Fraud.pptCredit_Card_Fraud.ppt
Credit_Card_Fraud.ppt
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraud
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Id Theft Presntation
Id Theft Presntation Id Theft Presntation
Id Theft Presntation
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 

Recently uploaded

如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书Fir sss
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionNilamPadekar1
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书SD DS
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
如何办理纽约州立大学石溪分校毕业证学位证书
 如何办理纽约州立大学石溪分校毕业证学位证书 如何办理纽约州立大学石溪分校毕业证学位证书
如何办理纽约州立大学石溪分校毕业证学位证书
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Trial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 seditionTrial Tilak t 1897,1909, and 1916 sedition
Trial Tilak t 1897,1909, and 1916 sedition
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
如何办理(Curtin毕业证书)科廷科技大学毕业证学位证书
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 

Credit card frauds

  • 1. 1
  • 2. CREDIT CARD FRAUDS Lost or Stolen Card – 48% Identity Theft – 15% Skimming – 14% Counterfeit Card – 12% Phishing – 6% Other – 5% 2 Stolen Identity Theft Skimming Counterfeit Phishing Other Stolen Identity Theft Skimming Counterfeit Phishing Other
  • 3. STOLEN CARDS • When a credit card is lost or stolen, it may be used for illegal purchases until the holder notifies the issuing bank and the bank puts a block on the account. • It is possible for a thief to make unauthorized purchases on a card before the card is canceled. 3
  • 4. ID THEFT • Application fraud Application fraud takes place when a person uses stolen or fake documents to open an account in another person's name. Criminals may steal documents such as utility bills and bank statements to build up useful personal information. Alternatively, they may create fake documents. With this information, they could open a credit card account or loan account in the victim's name, and then fully draw it. 4
  • 5. ID THEFT • ACCOUNT TAKEOVER An account takeover occurs when criminals pose as a genuine customer, gain control of an account and then makes unauthorized transactions. A fraudster uses parts of the victim’s identity such as an email address to gain access to financial accounts. This individual then intercepts communication about the account to keep the victim blind to any threats. 5
  • 6. ID THIEVES HARM VICTIMS BY- Using their names and other personal information to open new credit accounts. Accessing existing credit and bank accounts to make unauthorized purchases. Victims of ID theft are not held liable for losses, but it takes time and effort for victims to prove fraud and clean up the chaos. 6
  • 7. SKIMMING 7 When any person make illegal copies of credit or debit cards using a “skimmer” device that captures credit card numbers and other account information. The stolen credit information is used to make purchases by phone and internet, or to make counterfeit cards.
  • 8. PHISHING • Phishing is a financial crime that starts with massive numbers of deceptive spam e-mails. • These e-mails look like they come from your bank. • But they are just a trick to get account numbers and passwords. • Refer section 66 of Information Technology Act 2000. 8
  • 9.  PROTECT YOUR ACCOUNT NUMBERS • Never write your credit card number on post cards or on the outside of envelopes. • Never provide your card number on the phone, unless you know it’s a legitimate, reputable business. • Never give your account number to anyone who calls you on the phone or sends you an e-mail. 9 PRECAUTIONARY MEASURES TO AVOID CREDIT CARD FRAUDS
  • 10.  INTERNET SAFEGUARDS • Avoid providing your credit card number to websites offering “free access”. • Install a firewall in your computer to prevent unauthorized access from hackers. 10  WATCH YOUR CREDIT CARD • Watch closely when store or restaurant employees handle your card to make sure they are not copying or “Skimming” your credit card number. • After you make a purchase and your card is handed back to you, make sure the card is yours.
  • 11.  PROTECT YOUR WALLET OR PURSE • Keep a close eye on your belongings. • Never carry all your credit cards. • Bring only the 1 or 2 cards you might need. • Carry your credit cards separate from your wallet. • If your wallet or purse is lost or stolen, call your credit card issuers immediately. 11
  • 12.  BILLING STATEMENTS • Review credit card statements closely on the day they arrive. • Report any questionable charges to your card issuer immediately. • A missing credit card statement may indicate stolen mail. Contact your card issuer right away if your bill doesn’t arrive around the usual date. • If you have a computer, consider signing up for online account access. This way you can track your account activity between statements. 12
  • 13.  IN CASE YOUR CARD IS LOST OR STOLEN Record all your account numbers and company contact information and keep the record in a secure place. That way you can easily find whom to call to report the loss. Never write down your personal identification number (PIN). Never give your PIN to anyone. 13
  • 14. REPORTING CREDIT CARD FRAUD To report credit card fraud  Inform your bank about the unauthorized transaction as soon as possible, maximum within 3 days of occurrence. You can inform by contacting them via Toll Free number, customer care number, phone banking, SMS, email, or by visiting any closest branch of the same bank Banks’ loss and fraud reporting system will immediately acknowledge your complaint and share a registered complaint number for your reference to keep a track of further developments. 14