SlideShare a Scribd company logo
1 of 1
Download to read offline
Scam-Proof Your Senior Checklist
About seven in 10 crimes against older Canadians are never reported to police because victims did not believe the incident
was important enough to seek help or because they dealt with the issue personally, according to Statistics Canada. Shame and
embarrassment can play a role in an older adult’s reluctance to talk about being scammed.
Family members may help seniors avoid the humiliation and potential financial devastation of a con. The Home Instead Senior Care®
network along with North American Security experts and the Canadian Council of Better Business Bureaus, recommend these tips to
help keep seniors from being exploited.



Shred documents that could be useful to criminals, including bank statements, credit card statements and offers, and
other financial information. Documents that need to be preserved, such as tax filings and car titles, should be stored in a
safe deposit box.



Insist that your senior check with the Canadian Council of Better Business Bureaus before he or she acts on a phone
call or a piece of mail, or agrees to a visit from an unknown person, business or charity. Point out suspicious mailings,
especially look-alike envelopes that mimic letters sent from Revenue Canada.



Add seniors to the national Do-Not-Call Registry. Instruct them to hang up if they get solicitation calls. Address the guilt
factor by reminding an older adult it can be difficult to recognize a scam.



Insist that your senior never give out personal information nor agree to give money over the phone, rather ask for written information to be sent through the mail. The best rule of thumb is to “never provide information in a phone call that
you did not initiate.”



Make sure a charity is registered with the Canadian government. Make a written “giving plan” together: list which
organizations the senior intends to support, and stick to it.



Establish a strong defense by posting a “No Solicitation” notice by a senior loved one’s front door and help your senior
to sort through his or her incoming mail. Watch TV with a loved one to monitor interest in infomercials or shopping
shows.



Remember that all new technology has a learning curve. Educate your senior loved one about email and phishing tactics.



Watch for individuals who have befriended your loved one. Lonely or isolated seniors may be vulnerable to criminals
who befriend them and provide companionship. Ask to talk to your parent’s new friend to find out more. A thief likely
won’t stick around long to chat.



Seniors who are scammed may be embarrassed and try to hide what happened. Watch for changes in their lifestyle as
well as any other unusual financial or business activity. If a senior can no longer handle his or her finances, encourage your
loved one to put a plan in place that can help ensure bills are paid and assets are protected. That plan may include your
senior designating a financial power of attorney or a representative to monitor credit card use, especially if he or she has
dementia.



If you can’t be there for your senior, find trustworthy people who can serve as eyes and ears for seniors by screening
door-to-door scammers and others who seek to exploit by telephone or computer. Helpers could be neighbours,
relatives, friends, faith community members or professional caregivers such as those from the Home Instead Senior Care
network.

For more information about protecting your seniors from scammers,
contact your local Home Instead Senior Care® office, or visit
ProtectSeniorsFromFraud.com.

Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.

More Related Content

Viewers also liked

Healthy eatonvill evoice
Healthy eatonvill evoiceHealthy eatonvill evoice
Healthy eatonvill evoicenannette64
 
πολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρηςπολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρηςteacher88
 
Hao hsiang ma resume
Hao hsiang ma resumeHao hsiang ma resume
Hao hsiang ma resumeEliot Ma
 
Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian - Mark - Fullbright
 
Terry Webb Resume_Final
Terry Webb Resume_FinalTerry Webb Resume_Final
Terry Webb Resume_FinalTerry Webb
 
Concrete Cutting & Breaking
Concrete Cutting & BreakingConcrete Cutting & Breaking
Concrete Cutting & Breakingconcut
 
Ubuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning TalkUbuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning TalkFukuda Takuro
 
Creating Gradle Plugins
Creating Gradle PluginsCreating Gradle Plugins
Creating Gradle PluginsAnnyce Davis
 
"SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ..."SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ...Anna Zarudzka
 

Viewers also liked (13)

2º eso unit 9
2º eso unit 92º eso unit 9
2º eso unit 9
 
For susah
For susahFor susah
For susah
 
Healthy eatonvill evoice
Healthy eatonvill evoiceHealthy eatonvill evoice
Healthy eatonvill evoice
 
πολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρηςπολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρης
 
Hao hsiang ma resume
Hao hsiang ma resumeHao hsiang ma resume
Hao hsiang ma resume
 
Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian
 
Terry Webb Resume_Final
Terry Webb Resume_FinalTerry Webb Resume_Final
Terry Webb Resume_Final
 
Concrete Cutting & Breaking
Concrete Cutting & BreakingConcrete Cutting & Breaking
Concrete Cutting & Breaking
 
Mosqueteros
MosqueterosMosqueteros
Mosqueteros
 
Ubuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning TalkUbuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning Talk
 
El mobbing power point 3
El mobbing power point 3El mobbing power point 3
El mobbing power point 3
 
Creating Gradle Plugins
Creating Gradle PluginsCreating Gradle Plugins
Creating Gradle Plugins
 
"SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ..."SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ...
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Scam Proof Your Senior Checklist - Canadian

  • 1. Scam-Proof Your Senior Checklist About seven in 10 crimes against older Canadians are never reported to police because victims did not believe the incident was important enough to seek help or because they dealt with the issue personally, according to Statistics Canada. Shame and embarrassment can play a role in an older adult’s reluctance to talk about being scammed. Family members may help seniors avoid the humiliation and potential financial devastation of a con. The Home Instead Senior Care® network along with North American Security experts and the Canadian Council of Better Business Bureaus, recommend these tips to help keep seniors from being exploited.  Shred documents that could be useful to criminals, including bank statements, credit card statements and offers, and other financial information. Documents that need to be preserved, such as tax filings and car titles, should be stored in a safe deposit box.  Insist that your senior check with the Canadian Council of Better Business Bureaus before he or she acts on a phone call or a piece of mail, or agrees to a visit from an unknown person, business or charity. Point out suspicious mailings, especially look-alike envelopes that mimic letters sent from Revenue Canada.  Add seniors to the national Do-Not-Call Registry. Instruct them to hang up if they get solicitation calls. Address the guilt factor by reminding an older adult it can be difficult to recognize a scam.  Insist that your senior never give out personal information nor agree to give money over the phone, rather ask for written information to be sent through the mail. The best rule of thumb is to “never provide information in a phone call that you did not initiate.”  Make sure a charity is registered with the Canadian government. Make a written “giving plan” together: list which organizations the senior intends to support, and stick to it.  Establish a strong defense by posting a “No Solicitation” notice by a senior loved one’s front door and help your senior to sort through his or her incoming mail. Watch TV with a loved one to monitor interest in infomercials or shopping shows.  Remember that all new technology has a learning curve. Educate your senior loved one about email and phishing tactics.  Watch for individuals who have befriended your loved one. Lonely or isolated seniors may be vulnerable to criminals who befriend them and provide companionship. Ask to talk to your parent’s new friend to find out more. A thief likely won’t stick around long to chat.  Seniors who are scammed may be embarrassed and try to hide what happened. Watch for changes in their lifestyle as well as any other unusual financial or business activity. If a senior can no longer handle his or her finances, encourage your loved one to put a plan in place that can help ensure bills are paid and assets are protected. That plan may include your senior designating a financial power of attorney or a representative to monitor credit card use, especially if he or she has dementia.  If you can’t be there for your senior, find trustworthy people who can serve as eyes and ears for seniors by screening door-to-door scammers and others who seek to exploit by telephone or computer. Helpers could be neighbours, relatives, friends, faith community members or professional caregivers such as those from the Home Instead Senior Care network. For more information about protecting your seniors from scammers, contact your local Home Instead Senior Care® office, or visit ProtectSeniorsFromFraud.com. Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.