SlideShare a Scribd company logo
Presented by : RUPALI NAYAK and SWETALINA
MOHANTY
UNDER GUIDANCE :
K.K. ACHARYA
What is bank fraud ?
 FRAUD means the crime of getting money by
deceiving people that is illegal or dishonest.
Bank fraud can be defined as an unethical
and/or criminal act by an individual or
organization to illegally attempt to possess or
receive money from a bank or financial
institution.
The reason of making fraud is to cheat the bank
for financial purpose .
Banks are an essential part of the Indian economy
.
While the primary responsibility for preventing
frauds lies with bank themselves .
Banks are dealing with public’s money and hence
it is imperative that employees should exercise
due care and diligence in handling the
transactions in banks .
The RBI has been advising banks from time to
time about the major fraud prone areas and the
safeguard necessary for prevention of frauds .
Typesof fraud
1 : CHEQUE FRAUD :most common cases of this
kind of fraud are through stolen cheques and
forged cheques .
The sooner you report the lost or stolen
checkbook the better. The bank will usually
reverse charges if you report the theft within 24
hours. ... Many banks will allow you to check
pending transactions and you may be able to
stop the transaction before it happens.
2 : Accounting fraud : In order to hide serious financial problems,
some businesses have been known to use fraudulent bookkeeping to
overstate sales and income, inflate the worth of the company's assets,
or state a profit when the company is operating at a loss.
3: Demand draft fraud : Demand draft (DD) fraud typically involves
one or more corrupt bank employees. Firstly, such employees remove
a few DD leaves or DD books from stock and write them like a regular
DD. Since they are insiders, they know the coding and punching of a
demand draft.
 Such fraudulent demand drafts are usually drawn payable at a distant
city without debiting an account. The draft is cashed at the payable
branch. The fraud is discovered only when the bank's head office does
the branch-wise reconciliation, which normally take six months, by
which time the money is gone.
4 : Payment card fraud : Credit card fraud is a
wide-ranging term for theft and fraud committed using or
involving a payment card, such as a credit card or debit card,
as a fraudulent source of funds in a transaction. The purpose
may be to obtain goods without paying, or to obtain
unauthorized funds from an account.
5 : Forgery and altered cheques :
 Fraudsters have altered cheques to change the name (in order
to deposit cheques intended for payment to someone else) or
the amount on the face of cheques, simple altering can
change $100.00 into $100,000.00, although transactions of
this value are subject to investigation as a precaution to
prevent fraud as policy.
 Instead of tampering with a real cheque, fraudsters may
alternatively attempt to forge a depositor's signature on a
blank cheque or even print their own cheques drawn on
accounts owned by others, non-existent accounts, etc. They
would subsequently cash the fraudulent cheque through
another bank and withdraw the money before the banks
realize that the cheque was a fraud.
6 : Money laundering :
 Money laundering is the process by which large amounts
of illegally obtained money (from drug trafficking, terrorist
activity or other serious crimes) is given the appearance of
having originated from a legitimate source.
7 : Phishing and Internet fraud :
 Phishing, also known as Internet fraud, operates by
sending forged e-mail, impersonating an online bank,
auction or payment site; the e-mail directs the user to a
forged web site which is designed to look like the login to
the legitimate site but which claims that the user must
update personal info.
 The information thus stolen is then used in other frauds,
such as theft of identity or online auction fraud.
FAQs
1 : I have transactions on my account that I did not
authorize. What should I do?
Ans :
 File a police report in the city where the unauthorized transaction
occurred. Keep this information accessible, as it is used to process
unauthorized transactions.
 Contact the company or merchant where the unauthorized transactions
occurred. Keep detailed notes regarding your conversation including
how the transaction was processed, the name of the person you
contacted, if the transaction was processed on-site, via the internet or
phone, etc.
 If the unauthorized transaction happened on a debit card, ATM card
or credit card, use the phone numbers below to report the transactions.
If the unauthorized transactions happened in your checking or savings
account (using your routing number and account number), visit a City &
County Credit Union branch to complete an Affidavit of Unauthorized
Entry.
FAQs continue :
2 : What should I do if my debit card or ATM card is
stolen?
ATM - If your City & County Credit Union ATM card is lost or stolen,
contact us at (651) 225-2700 or (800) 223-2801 or stop by a
branch during regular business hours. A Member Service Consultant will
cancel your old card and order you another. The new card will take 7-10
business days to arrive.
3 :WHAT IF MY PHONE IS LOST OR STOLEN ?(IF YOU ARE
DOING ONLINE BANKING THROUGH MOBOLE )
 If your device is lost or stolen , no one can access your mobile
banking without knowing your password .to prevent
unauthorized access to your account , you can deactivate
your mobile banking simply log in to your online banking
from your computer , select the option tab , & deactivate your
mobile banking services .
How can we prevent fraud?
Below are tips to help you protect your identity and
data while online :
General Tips:
Review financial statements for any suspicious
(doubtful )activity.
Never give out financial information to unknown
sources.
Never give out the three or four digit number on
your credit card to anyone claiming to be from a
financial institution.
As a general rule, type the web site into the
browser rather than following links received in an
email.
Computer and Mobile Use Tips :
 Only download information or click on links from people and
companies you know and trust.
 Never email personal or financial information.
 Never return a call that asks you to divulge any financial
information.
 Do not access online banking from a public computer.
 Do not access online banking when on a public Wi-Fi network.
 If asked to login to an online banking site to verify information,
immediately call and report the suspicious email to us.
 When logging onto a website, look for indications of a secure
website, including a lock symbol, and address bar that turns
green, and "https" at the beginning of the site's web address.
How can I prevent identity theft?
Identity theft can happen to you at anytime, but the following tips
can help you decrease the likelihood of becoming a victim of
identity theft ::
 Before revealing personal information, find out how it will be
used and if it will be shared with others.
 Pay attention to your billing cycles. A missing credit card bill can
mean a thief has taken over your credit card account and
changed your address.
 Check your financial institution statement each month. If you
find transactions you did not authorize, contact CONCERNED
BANK immediately.
 Only carry the credit cards you need. Do not give out personal
information unless you have initiated contact and know to whom
you are speaking.
CONCLUSION:
• Bank frauds are done to make money by
cheating the banks . There are several
loopholes in banking system that has been
used by fraudster. The numbers of bank frauds
has been increasing year on year along with
that , RBI also engage in making the banking
system accurate and secured .
Bank frauds

More Related Content

What's hot

Money laundering
Money launderingMoney laundering
Money launderingsaadiakh
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
central university of rajasthan
 
KYC
KYCKYC
presentation on scam
presentation on scampresentation on scam
presentation on scammustafa2426
 
Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis
Ruby Research Labs
 
PNB SCAM (NIRAV MODI Case)
PNB SCAM (NIRAV MODI Case)PNB SCAM (NIRAV MODI Case)
PNB SCAM (NIRAV MODI Case)
Bharath Somashekar
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
BISWAJITGHORAI2
 
5 biggest banking scams in india
5 biggest banking scams in india 5 biggest banking scams in india
5 biggest banking scams in india
Universal Business School (Karjat)
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
SBS AND COMPANY LLP, CHARTERED ACCOUNTANTS
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
Kyc Know Your Customer
Kyc Know Your CustomerKyc Know Your Customer
Kyc Know Your Customer
ASAD ALI
 
Major scam in india ppt
Major scam in india pptMajor scam in india ppt
Major scam in india ppt
Rama Krishna Angirekula
 
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshare
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slidesharePunjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshare
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshare
Fatema Tandiwala
 
Scam in india
Scam in indiaScam in india
Scam in india
Vivek Mishra
 
Trends in banking sector
Trends in banking sectorTrends in banking sector
Trends in banking sector
Rinkle Kaur
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
Sanjoy Suthar
 
Evolution of banking
Evolution of bankingEvolution of banking
Evolution of banking
Vinor5
 
Payment systems
Payment systemsPayment systems
Payment systems
Abhijeet Deshmukh
 
Kyc banks
Kyc banksKyc banks

What's hot (20)

Money laundering
Money launderingMoney laundering
Money laundering
 
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
Causes, Effects and Management of Fraud: A Study with reference to Indian Ban...
 
KYC
KYCKYC
KYC
 
presentation on scam
presentation on scampresentation on scam
presentation on scam
 
Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis Financial Frauds In Indian Banking System: A Case Study Analysis
Financial Frauds In Indian Banking System: A Case Study Analysis
 
PNB SCAM (NIRAV MODI Case)
PNB SCAM (NIRAV MODI Case)PNB SCAM (NIRAV MODI Case)
PNB SCAM (NIRAV MODI Case)
 
Bank frauds & its safety
Bank frauds & its safetyBank frauds & its safety
Bank frauds & its safety
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
5 biggest banking scams in india
5 biggest banking scams in india 5 biggest banking scams in india
5 biggest banking scams in india
 
Case study on forensic audit
Case study on forensic auditCase study on forensic audit
Case study on forensic audit
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
Kyc Know Your Customer
Kyc Know Your CustomerKyc Know Your Customer
Kyc Know Your Customer
 
Major scam in india ppt
Major scam in india pptMajor scam in india ppt
Major scam in india ppt
 
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshare
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slidesharePunjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshare
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshare
 
Scam in india
Scam in indiaScam in india
Scam in india
 
Trends in banking sector
Trends in banking sectorTrends in banking sector
Trends in banking sector
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
 
Evolution of banking
Evolution of bankingEvolution of banking
Evolution of banking
 
Payment systems
Payment systemsPayment systems
Payment systems
 
Kyc banks
Kyc banksKyc banks
Kyc banks
 

Similar to Bank frauds

Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
Kumarasamy Dr.PK
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
Rushikesh Maddalwar
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
PawanKumarJha7
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)
Prashant raj
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
Dixita S
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
Norfolk Naval Shipyard
 
Money Management
Money ManagementMoney Management
Money Management
kbrosterhous
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
David Atkinson
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
- Mark - Fullbright
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
- Mark - Fullbright
 
NET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptxNET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptx
RohanPanda8
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
- Mark - Fullbright
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
- Mark - Fullbright
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
- Mark - Fullbright
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
quentinz52
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
- Mark - Fullbright
 

Similar to Bank frauds (20)

Unit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of FraudsUnit 2- Economic Offences Types of Frauds
Unit 2- Economic Offences Types of Frauds
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Fraud in bank
Fraud in bankFraud in bank
Fraud in bank
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Bank frauds vk (2)
Bank frauds vk (2)Bank frauds vk (2)
Bank frauds vk (2)
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Cyber Fraud
Cyber Fraud Cyber Fraud
Cyber Fraud
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Money Management
Money ManagementMoney Management
Money Management
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
NET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptxNET BANKING - divya s gupta.pptx
NET BANKING - divya s gupta.pptx
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
IdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCentsIdentIty Theft - ConsumerCents
IdentIty Theft - ConsumerCents
 

More from jagannath ojha

Golden jubilee
Golden jubileeGolden jubilee
Golden jubilee
jagannath ojha
 
Golden jubilee
Golden jubileeGolden jubilee
Golden jubilee
jagannath ojha
 
Banking servics
Banking servicsBanking servics
Banking servics
jagannath ojha
 
the role of state in industrial relations , role of state in IR
the role of state in industrial relations , role of state in IR the role of state in industrial relations , role of state in IR
the role of state in industrial relations , role of state in IR
jagannath ojha
 
importances of state industrial relation , industrial relations
importances of state industrial relation , industrial relations importances of state industrial relation , industrial relations
importances of state industrial relation , industrial relations
jagannath ojha
 
Sarfaesi act
Sarfaesi actSarfaesi act
Sarfaesi act
jagannath ojha
 
Save water save life
Save water save lifeSave water save life
Save water save life
jagannath ojha
 
Banking payment products
Banking payment productsBanking payment products
Banking payment products
jagannath ojha
 
Human resources planning(meaning , definition and process
Human resources planning(meaning , definition and processHuman resources planning(meaning , definition and process
Human resources planning(meaning , definition and process
jagannath ojha
 
Why should youth participate in politics
Why should youth  participate in politicsWhy should youth  participate in politics
Why should youth participate in politics
jagannath ojha
 
Banking and insurance
Banking and insuranceBanking and insurance
Banking and insurance
jagannath ojha
 

More from jagannath ojha (11)

Golden jubilee
Golden jubileeGolden jubilee
Golden jubilee
 
Golden jubilee
Golden jubileeGolden jubilee
Golden jubilee
 
Banking servics
Banking servicsBanking servics
Banking servics
 
the role of state in industrial relations , role of state in IR
the role of state in industrial relations , role of state in IR the role of state in industrial relations , role of state in IR
the role of state in industrial relations , role of state in IR
 
importances of state industrial relation , industrial relations
importances of state industrial relation , industrial relations importances of state industrial relation , industrial relations
importances of state industrial relation , industrial relations
 
Sarfaesi act
Sarfaesi actSarfaesi act
Sarfaesi act
 
Save water save life
Save water save lifeSave water save life
Save water save life
 
Banking payment products
Banking payment productsBanking payment products
Banking payment products
 
Human resources planning(meaning , definition and process
Human resources planning(meaning , definition and processHuman resources planning(meaning , definition and process
Human resources planning(meaning , definition and process
 
Why should youth participate in politics
Why should youth  participate in politicsWhy should youth  participate in politics
Why should youth participate in politics
 
Banking and insurance
Banking and insuranceBanking and insurance
Banking and insurance
 

Recently uploaded

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 

Recently uploaded (20)

CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 

Bank frauds

  • 1. Presented by : RUPALI NAYAK and SWETALINA MOHANTY UNDER GUIDANCE : K.K. ACHARYA
  • 2. What is bank fraud ?  FRAUD means the crime of getting money by deceiving people that is illegal or dishonest. Bank fraud can be defined as an unethical and/or criminal act by an individual or organization to illegally attempt to possess or receive money from a bank or financial institution. The reason of making fraud is to cheat the bank for financial purpose .
  • 3. Banks are an essential part of the Indian economy . While the primary responsibility for preventing frauds lies with bank themselves . Banks are dealing with public’s money and hence it is imperative that employees should exercise due care and diligence in handling the transactions in banks . The RBI has been advising banks from time to time about the major fraud prone areas and the safeguard necessary for prevention of frauds .
  • 4.
  • 5.
  • 6. Typesof fraud 1 : CHEQUE FRAUD :most common cases of this kind of fraud are through stolen cheques and forged cheques . The sooner you report the lost or stolen checkbook the better. The bank will usually reverse charges if you report the theft within 24 hours. ... Many banks will allow you to check pending transactions and you may be able to stop the transaction before it happens.
  • 7. 2 : Accounting fraud : In order to hide serious financial problems, some businesses have been known to use fraudulent bookkeeping to overstate sales and income, inflate the worth of the company's assets, or state a profit when the company is operating at a loss. 3: Demand draft fraud : Demand draft (DD) fraud typically involves one or more corrupt bank employees. Firstly, such employees remove a few DD leaves or DD books from stock and write them like a regular DD. Since they are insiders, they know the coding and punching of a demand draft.  Such fraudulent demand drafts are usually drawn payable at a distant city without debiting an account. The draft is cashed at the payable branch. The fraud is discovered only when the bank's head office does the branch-wise reconciliation, which normally take six months, by which time the money is gone.
  • 8. 4 : Payment card fraud : Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.
  • 9. 5 : Forgery and altered cheques :  Fraudsters have altered cheques to change the name (in order to deposit cheques intended for payment to someone else) or the amount on the face of cheques, simple altering can change $100.00 into $100,000.00, although transactions of this value are subject to investigation as a precaution to prevent fraud as policy.  Instead of tampering with a real cheque, fraudsters may alternatively attempt to forge a depositor's signature on a blank cheque or even print their own cheques drawn on accounts owned by others, non-existent accounts, etc. They would subsequently cash the fraudulent cheque through another bank and withdraw the money before the banks realize that the cheque was a fraud.
  • 10. 6 : Money laundering :  Money laundering is the process by which large amounts of illegally obtained money (from drug trafficking, terrorist activity or other serious crimes) is given the appearance of having originated from a legitimate source. 7 : Phishing and Internet fraud :  Phishing, also known as Internet fraud, operates by sending forged e-mail, impersonating an online bank, auction or payment site; the e-mail directs the user to a forged web site which is designed to look like the login to the legitimate site but which claims that the user must update personal info.  The information thus stolen is then used in other frauds, such as theft of identity or online auction fraud.
  • 11.
  • 12. FAQs 1 : I have transactions on my account that I did not authorize. What should I do? Ans :  File a police report in the city where the unauthorized transaction occurred. Keep this information accessible, as it is used to process unauthorized transactions.  Contact the company or merchant where the unauthorized transactions occurred. Keep detailed notes regarding your conversation including how the transaction was processed, the name of the person you contacted, if the transaction was processed on-site, via the internet or phone, etc.  If the unauthorized transaction happened on a debit card, ATM card or credit card, use the phone numbers below to report the transactions. If the unauthorized transactions happened in your checking or savings account (using your routing number and account number), visit a City & County Credit Union branch to complete an Affidavit of Unauthorized Entry.
  • 13. FAQs continue : 2 : What should I do if my debit card or ATM card is stolen? ATM - If your City & County Credit Union ATM card is lost or stolen, contact us at (651) 225-2700 or (800) 223-2801 or stop by a branch during regular business hours. A Member Service Consultant will cancel your old card and order you another. The new card will take 7-10 business days to arrive. 3 :WHAT IF MY PHONE IS LOST OR STOLEN ?(IF YOU ARE DOING ONLINE BANKING THROUGH MOBOLE )  If your device is lost or stolen , no one can access your mobile banking without knowing your password .to prevent unauthorized access to your account , you can deactivate your mobile banking simply log in to your online banking from your computer , select the option tab , & deactivate your mobile banking services .
  • 14. How can we prevent fraud? Below are tips to help you protect your identity and data while online : General Tips: Review financial statements for any suspicious (doubtful )activity. Never give out financial information to unknown sources. Never give out the three or four digit number on your credit card to anyone claiming to be from a financial institution. As a general rule, type the web site into the browser rather than following links received in an email.
  • 15. Computer and Mobile Use Tips :  Only download information or click on links from people and companies you know and trust.  Never email personal or financial information.  Never return a call that asks you to divulge any financial information.  Do not access online banking from a public computer.  Do not access online banking when on a public Wi-Fi network.  If asked to login to an online banking site to verify information, immediately call and report the suspicious email to us.  When logging onto a website, look for indications of a secure website, including a lock symbol, and address bar that turns green, and "https" at the beginning of the site's web address.
  • 16. How can I prevent identity theft? Identity theft can happen to you at anytime, but the following tips can help you decrease the likelihood of becoming a victim of identity theft ::  Before revealing personal information, find out how it will be used and if it will be shared with others.  Pay attention to your billing cycles. A missing credit card bill can mean a thief has taken over your credit card account and changed your address.  Check your financial institution statement each month. If you find transactions you did not authorize, contact CONCERNED BANK immediately.  Only carry the credit cards you need. Do not give out personal information unless you have initiated contact and know to whom you are speaking.
  • 17. CONCLUSION: • Bank frauds are done to make money by cheating the banks . There are several loopholes in banking system that has been used by fraudster. The numbers of bank frauds has been increasing year on year along with that , RBI also engage in making the banking system accurate and secured .