Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshareFatema Tandiwala
A case study presentation on Punjab National Bank scam (Nirav Modi)
India's second largest state-owned lender Punjab National Bank disclosed on Feb. 14, 2018 that it was the victim of the country’s largest bank fraud.
PNB revealed that fraudulent transactions by billionaire jeweler Nirav Modi and related entities amounted to $1.77 billion or over Rs 11,400 crore.
The key accused in the case were jeweler and designer Nirav Modi, his maternal uncle Mehul Choksi, and other relatives and some PNB employees.
Nirav Modi and his relatives escaped India in early 2018, days before the news of the scam became public.
PNB scam has been dubbed as the biggest fraud in India's banking history.
Introduction to Banking, Evolution of Banking, History of Banking system, Route map from traditional banking to Modern banking, Modern Banking system and its evolution, Growth of Indian Banking System
This presentation covers the Payments systems in India. It starts with Introduction and then cover paper payment systems like Cheque Truncation System (CTS), MICR, CTS 2010. In Electronic payment systems it covers RTGS, IFSC, UTR No, NEFT, IMPS & difference between them. It also covers the limitations of Indian Payment system. In last leg it covers in detail SWIFT in details with latest statistics
Punjab National Bank Fraud (Nirav Modi Scam) ppt presentation slideshareFatema Tandiwala
A case study presentation on Punjab National Bank scam (Nirav Modi)
India's second largest state-owned lender Punjab National Bank disclosed on Feb. 14, 2018 that it was the victim of the country’s largest bank fraud.
PNB revealed that fraudulent transactions by billionaire jeweler Nirav Modi and related entities amounted to $1.77 billion or over Rs 11,400 crore.
The key accused in the case were jeweler and designer Nirav Modi, his maternal uncle Mehul Choksi, and other relatives and some PNB employees.
Nirav Modi and his relatives escaped India in early 2018, days before the news of the scam became public.
PNB scam has been dubbed as the biggest fraud in India's banking history.
Introduction to Banking, Evolution of Banking, History of Banking system, Route map from traditional banking to Modern banking, Modern Banking system and its evolution, Growth of Indian Banking System
This presentation covers the Payments systems in India. It starts with Introduction and then cover paper payment systems like Cheque Truncation System (CTS), MICR, CTS 2010. In Electronic payment systems it covers RTGS, IFSC, UTR No, NEFT, IMPS & difference between them. It also covers the limitations of Indian Payment system. In last leg it covers in detail SWIFT in details with latest statistics
Over 40% of businesses in the UK have experienced fraud in the last year.
This practical guide gives you the information you need to help protect your business against growing threats of fraud.
We show you how and where fraud can take place throughout your business and highlight the "telltale" things to look out for.
We’ve also included key actions you should take to safeguard yourself and your business.
Taking some very basic steps can make a real difference to fraudsters’ success rates.
Whether you are a client of not I do hope that this guide helps business avoid being another statistic of crime this year.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Digital Tools and AI for Teaching Learning and Research
Bank frauds
1. Presented by : RUPALI NAYAK and SWETALINA
MOHANTY
UNDER GUIDANCE :
K.K. ACHARYA
2. What is bank fraud ?
FRAUD means the crime of getting money by
deceiving people that is illegal or dishonest.
Bank fraud can be defined as an unethical
and/or criminal act by an individual or
organization to illegally attempt to possess or
receive money from a bank or financial
institution.
The reason of making fraud is to cheat the bank
for financial purpose .
3. Banks are an essential part of the Indian economy
.
While the primary responsibility for preventing
frauds lies with bank themselves .
Banks are dealing with public’s money and hence
it is imperative that employees should exercise
due care and diligence in handling the
transactions in banks .
The RBI has been advising banks from time to
time about the major fraud prone areas and the
safeguard necessary for prevention of frauds .
4.
5.
6. Typesof fraud
1 : CHEQUE FRAUD :most common cases of this
kind of fraud are through stolen cheques and
forged cheques .
The sooner you report the lost or stolen
checkbook the better. The bank will usually
reverse charges if you report the theft within 24
hours. ... Many banks will allow you to check
pending transactions and you may be able to
stop the transaction before it happens.
7. 2 : Accounting fraud : In order to hide serious financial problems,
some businesses have been known to use fraudulent bookkeeping to
overstate sales and income, inflate the worth of the company's assets,
or state a profit when the company is operating at a loss.
3: Demand draft fraud : Demand draft (DD) fraud typically involves
one or more corrupt bank employees. Firstly, such employees remove
a few DD leaves or DD books from stock and write them like a regular
DD. Since they are insiders, they know the coding and punching of a
demand draft.
Such fraudulent demand drafts are usually drawn payable at a distant
city without debiting an account. The draft is cashed at the payable
branch. The fraud is discovered only when the bank's head office does
the branch-wise reconciliation, which normally take six months, by
which time the money is gone.
8. 4 : Payment card fraud : Credit card fraud is a
wide-ranging term for theft and fraud committed using or
involving a payment card, such as a credit card or debit card,
as a fraudulent source of funds in a transaction. The purpose
may be to obtain goods without paying, or to obtain
unauthorized funds from an account.
9. 5 : Forgery and altered cheques :
Fraudsters have altered cheques to change the name (in order
to deposit cheques intended for payment to someone else) or
the amount on the face of cheques, simple altering can
change $100.00 into $100,000.00, although transactions of
this value are subject to investigation as a precaution to
prevent fraud as policy.
Instead of tampering with a real cheque, fraudsters may
alternatively attempt to forge a depositor's signature on a
blank cheque or even print their own cheques drawn on
accounts owned by others, non-existent accounts, etc. They
would subsequently cash the fraudulent cheque through
another bank and withdraw the money before the banks
realize that the cheque was a fraud.
10. 6 : Money laundering :
Money laundering is the process by which large amounts
of illegally obtained money (from drug trafficking, terrorist
activity or other serious crimes) is given the appearance of
having originated from a legitimate source.
7 : Phishing and Internet fraud :
Phishing, also known as Internet fraud, operates by
sending forged e-mail, impersonating an online bank,
auction or payment site; the e-mail directs the user to a
forged web site which is designed to look like the login to
the legitimate site but which claims that the user must
update personal info.
The information thus stolen is then used in other frauds,
such as theft of identity or online auction fraud.
11.
12. FAQs
1 : I have transactions on my account that I did not
authorize. What should I do?
Ans :
File a police report in the city where the unauthorized transaction
occurred. Keep this information accessible, as it is used to process
unauthorized transactions.
Contact the company or merchant where the unauthorized transactions
occurred. Keep detailed notes regarding your conversation including
how the transaction was processed, the name of the person you
contacted, if the transaction was processed on-site, via the internet or
phone, etc.
If the unauthorized transaction happened on a debit card, ATM card
or credit card, use the phone numbers below to report the transactions.
If the unauthorized transactions happened in your checking or savings
account (using your routing number and account number), visit a City &
County Credit Union branch to complete an Affidavit of Unauthorized
Entry.
13. FAQs continue :
2 : What should I do if my debit card or ATM card is
stolen?
ATM - If your City & County Credit Union ATM card is lost or stolen,
contact us at (651) 225-2700 or (800) 223-2801 or stop by a
branch during regular business hours. A Member Service Consultant will
cancel your old card and order you another. The new card will take 7-10
business days to arrive.
3 :WHAT IF MY PHONE IS LOST OR STOLEN ?(IF YOU ARE
DOING ONLINE BANKING THROUGH MOBOLE )
If your device is lost or stolen , no one can access your mobile
banking without knowing your password .to prevent
unauthorized access to your account , you can deactivate
your mobile banking simply log in to your online banking
from your computer , select the option tab , & deactivate your
mobile banking services .
14. How can we prevent fraud?
Below are tips to help you protect your identity and
data while online :
General Tips:
Review financial statements for any suspicious
(doubtful )activity.
Never give out financial information to unknown
sources.
Never give out the three or four digit number on
your credit card to anyone claiming to be from a
financial institution.
As a general rule, type the web site into the
browser rather than following links received in an
email.
15. Computer and Mobile Use Tips :
Only download information or click on links from people and
companies you know and trust.
Never email personal or financial information.
Never return a call that asks you to divulge any financial
information.
Do not access online banking from a public computer.
Do not access online banking when on a public Wi-Fi network.
If asked to login to an online banking site to verify information,
immediately call and report the suspicious email to us.
When logging onto a website, look for indications of a secure
website, including a lock symbol, and address bar that turns
green, and "https" at the beginning of the site's web address.
16. How can I prevent identity theft?
Identity theft can happen to you at anytime, but the following tips
can help you decrease the likelihood of becoming a victim of
identity theft ::
Before revealing personal information, find out how it will be
used and if it will be shared with others.
Pay attention to your billing cycles. A missing credit card bill can
mean a thief has taken over your credit card account and
changed your address.
Check your financial institution statement each month. If you
find transactions you did not authorize, contact CONCERNED
BANK immediately.
Only carry the credit cards you need. Do not give out personal
information unless you have initiated contact and know to whom
you are speaking.
17. CONCLUSION:
• Bank frauds are done to make money by
cheating the banks . There are several
loopholes in banking system that has been
used by fraudster. The numbers of bank frauds
has been increasing year on year along with
that , RBI also engage in making the banking
system accurate and secured .