SlideShare a Scribd company logo
1 of 7
Download to read offline
Client Screening Tips for
Escorts
by VerifyHim.com
Screening is a critical step in the escort
business that often overlooked.
You will spend time alone with a client
after all, so it makes sense to verify him
before the date
As in any business, there are always
scammers and abusers lurking around for
opportunities.
Information to obtain from a Client
Full name - including the middle initial. You
should also check this information against
their ID on your date before doing anything
else.
Phone number.
Primary Email Address.
Escort References (2 or more are
preferably)- Make sure to ask when and where they met
and any unique details to help reminding the escorts of their
encounters.
You can use the first #1, #2 and #3 pieces of
information with Verifyhim.com.
Our full search will check his information
against our blacklist database.
We also go through several escorts review
sites, boards and forums to check his
membership.
There are changes that he has posted a review
or being reviewed by an escort. If he has been
a frequent with many escorts, the search will
yield some results.
Look out for these signs of problems:
There are no records of his provided
information.
All of his information (email, phone,...) seems
to be created recently.
He is in VerifyHim.com's blacklist database.
There are also signs of behavior
problems
He sends you a picture of his penis.
He wants to have a photo of your face and/or
other revealing photos.
Really short email ("Are you still available?"
�), rude language...
Keep asking too many questions and stuffs.
If you encounter a time-waster once in
a while, please report it to Verifyhim.
com
Don't see a client if you feel that something
is not right about him.

More Related Content

Similar to Client screening tips

Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator TrainingSLINGR
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tantaSamir Deutsch
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
Identity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your ClientsIdentity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your ClientsRegina Brown
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineeringKasper de Waard
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraudmiteshppt
 
B2b tracking-tool
B2b tracking-toolB2b tracking-tool
B2b tracking-toolAnne Cole
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Phishing Email Checklist slideshare1-200908095127.pdf
Phishing Email Checklist slideshare1-200908095127.pdfPhishing Email Checklist slideshare1-200908095127.pdf
Phishing Email Checklist slideshare1-200908095127.pdfM Harvey
 
Advanced caller-id
Advanced caller-idAdvanced caller-id
Advanced caller-idGrous1954
 

Similar to Client screening tips (20)

Antiscam
AntiscamAntiscam
Antiscam
 
Identity Theft Investigator Training
Identity Theft Investigator TrainingIdentity Theft Investigator Training
Identity Theft Investigator Training
 
February 2017 Market Monitor
February 2017 Market MonitorFebruary 2017 Market Monitor
February 2017 Market Monitor
 
Cyber peace for youth tanta
Cyber peace for youth tantaCyber peace for youth tanta
Cyber peace for youth tanta
 
Anatomy of a Scam
Anatomy of a ScamAnatomy of a Scam
Anatomy of a Scam
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
Identity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your ClientsIdentity Theft: Protect Yourself, your Business, your Clients
Identity Theft: Protect Yourself, your Business, your Clients
 
Fraudulent bank wiring
Fraudulent bank wiringFraudulent bank wiring
Fraudulent bank wiring
 
BBB Market Monitor: October 2019
BBB Market Monitor: October 2019 BBB Market Monitor: October 2019
BBB Market Monitor: October 2019
 
Irm 10-social engineering
Irm 10-social engineeringIrm 10-social engineering
Irm 10-social engineering
 
BBB Market Monitor: October 2020
BBB Market Monitor: October 2020BBB Market Monitor: October 2020
BBB Market Monitor: October 2020
 
E commerce fraud
E commerce fraudE commerce fraud
E commerce fraud
 
Phishing 1 vp
Phishing 1 vpPhishing 1 vp
Phishing 1 vp
 
Avoiding Online Job Scams
Avoiding Online Job ScamsAvoiding Online Job Scams
Avoiding Online Job Scams
 
B2b tracking-tool
B2b tracking-toolB2b tracking-tool
B2b tracking-tool
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Phishing Email Checklist slideshare1-200908095127.pdf
Phishing Email Checklist slideshare1-200908095127.pdfPhishing Email Checklist slideshare1-200908095127.pdf
Phishing Email Checklist slideshare1-200908095127.pdf
 
Advanced caller-id
Advanced caller-idAdvanced caller-id
Advanced caller-id
 
Advanced caller-id
Advanced caller-idAdvanced caller-id
Advanced caller-id
 
Advanced caller-id
Advanced caller-idAdvanced caller-id
Advanced caller-id
 

Recently uploaded

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfAnubhavMangla3
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxjbellis
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistandanishmna97
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 

Recently uploaded (20)

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

Client screening tips

  • 1. Client Screening Tips for Escorts by VerifyHim.com
  • 2. Screening is a critical step in the escort business that often overlooked. You will spend time alone with a client after all, so it makes sense to verify him before the date As in any business, there are always scammers and abusers lurking around for opportunities.
  • 3. Information to obtain from a Client Full name - including the middle initial. You should also check this information against their ID on your date before doing anything else. Phone number. Primary Email Address. Escort References (2 or more are preferably)- Make sure to ask when and where they met and any unique details to help reminding the escorts of their encounters.
  • 4. You can use the first #1, #2 and #3 pieces of information with Verifyhim.com. Our full search will check his information against our blacklist database. We also go through several escorts review sites, boards and forums to check his membership. There are changes that he has posted a review or being reviewed by an escort. If he has been a frequent with many escorts, the search will yield some results.
  • 5. Look out for these signs of problems: There are no records of his provided information. All of his information (email, phone,...) seems to be created recently. He is in VerifyHim.com's blacklist database.
  • 6. There are also signs of behavior problems He sends you a picture of his penis. He wants to have a photo of your face and/or other revealing photos. Really short email ("Are you still available?" �), rude language... Keep asking too many questions and stuffs.
  • 7. If you encounter a time-waster once in a while, please report it to Verifyhim. com Don't see a client if you feel that something is not right about him.