Presentation on Financial Crimes. Money is one of the most important reasons behind all forms of crime whether Cyber or Internet crimes, Physical or Theft crimes. With the advancement of technology the crime has not decelerated but only esteemed and many more new techniques were by people and they were popularly called as Blackhat hackers. In this presentations we give an over view of the whole scenario.
money laundering and corruption
,
what is money laundering
,
suspicious transaction means such transaction:
,
what are some of the challenges
,
why and how to combat money laundering
,
money laundering
,
money laundering process
,
mlpa-2012
,
incentives to launder
Basics of Anti-Money Laundering : A Really Quick Primer
What is Money Laundering?
The act of concealing or disguising (laundering) of funds obtained through illegal activity
so that they appear to have been generated through legal, legitimate sources.
How is it Carried Out?
Shell companies, intermediaries and money transmitters usually transfer these funds around the world Banks and other financial institutions are the chosen medium for laundering these illegal funds
AML Regulations:
The Bank Secrecy Act is the most important Anti-Money Laundering (AML) regulation
The BSA requires financial institutions to:
Keep records of cash purchases of negotiable instruments
File reports of cash transactions exceeding $10,000 (daily aggregate amount)
Report suspicious activity that might signify money laundering, tax evasion, or other criminal activities
Implement a written, board-approved compliance monitoring program
The USA Patriot Act
Expands AML requirements to all financial institutions
Augments existing BSA framework
AML Best Practices:
In order to combat money laundering, banks should implement the following best practices:
Customer Identification Program (CIP)
Customer Due Diligence (CDD) Program
Bank Secrecy Act/Anti-Money Laundering Risk Assessment
Identification and Reporting of Suspicious Activity
Want to learn more about anti-money laundering process and best practices? ComplianceOnline webinars and seminars are a great training resource. Check out the following links:
http://www.complianceonline.com/anti-money-laundering-aml-compliance-program-seminar-training-80114SEM-prdsm?channel=amlppt
http://www.complianceonline.com/bsa-aml-ofac-risk-assessments-regulatory-requirements-seminar-training-80181SEM-prdsm?channel=ppt
http://www.complianceonline.com/bsa-aml-compliance-reporting-requirements-webinar-training-703352-prdw?channel=amlppt
http://www.complianceonline.com/bsa-aml-compliance-checklists-webinar-training-703178-prdw?channel=amlppt
http://www.complianceonline.com/bsa-aml-ofac-risk-assessments-and-evaluation-compliance-program-webinar-training-703493-prdw?channel=amlppt
http://www.complianceonline.com/best-practices-for-developing-risk-models-for-aml-bsa-monitoring-webinar-training-703628-prdw?channel=amlppt
money laundering and corruption
,
what is money laundering
,
suspicious transaction means such transaction:
,
what are some of the challenges
,
why and how to combat money laundering
,
money laundering
,
money laundering process
,
mlpa-2012
,
incentives to launder
Basics of Anti-Money Laundering : A Really Quick Primer
What is Money Laundering?
The act of concealing or disguising (laundering) of funds obtained through illegal activity
so that they appear to have been generated through legal, legitimate sources.
How is it Carried Out?
Shell companies, intermediaries and money transmitters usually transfer these funds around the world Banks and other financial institutions are the chosen medium for laundering these illegal funds
AML Regulations:
The Bank Secrecy Act is the most important Anti-Money Laundering (AML) regulation
The BSA requires financial institutions to:
Keep records of cash purchases of negotiable instruments
File reports of cash transactions exceeding $10,000 (daily aggregate amount)
Report suspicious activity that might signify money laundering, tax evasion, or other criminal activities
Implement a written, board-approved compliance monitoring program
The USA Patriot Act
Expands AML requirements to all financial institutions
Augments existing BSA framework
AML Best Practices:
In order to combat money laundering, banks should implement the following best practices:
Customer Identification Program (CIP)
Customer Due Diligence (CDD) Program
Bank Secrecy Act/Anti-Money Laundering Risk Assessment
Identification and Reporting of Suspicious Activity
Want to learn more about anti-money laundering process and best practices? ComplianceOnline webinars and seminars are a great training resource. Check out the following links:
http://www.complianceonline.com/anti-money-laundering-aml-compliance-program-seminar-training-80114SEM-prdsm?channel=amlppt
http://www.complianceonline.com/bsa-aml-ofac-risk-assessments-regulatory-requirements-seminar-training-80181SEM-prdsm?channel=ppt
http://www.complianceonline.com/bsa-aml-compliance-reporting-requirements-webinar-training-703352-prdw?channel=amlppt
http://www.complianceonline.com/bsa-aml-compliance-checklists-webinar-training-703178-prdw?channel=amlppt
http://www.complianceonline.com/bsa-aml-ofac-risk-assessments-and-evaluation-compliance-program-webinar-training-703493-prdw?channel=amlppt
http://www.complianceonline.com/best-practices-for-developing-risk-models-for-aml-bsa-monitoring-webinar-training-703628-prdw?channel=amlppt
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMd. Moulude Hossain
Financial Crime is an increasing concern for all financial institutions, which is developing rapidly and equally together with technology. May be not limited to money laundering and terrorist financing, these two form of financial crime deserve to be attended with utmost care.
The evolving challenges of Money Laundering (ML) and Terrorist Financing (TF) lead the evolution of anti-money laundering and counter terrorist financing convention and regulations. These conventions give birth of several international organizations to combat the impact of ML and TF.
Financial crimes compliance and enforcement trends 2019Joseph V. Moreno
Panel presentation to the DC Bar Association on September 12, 2019, by Joseph Moreno of Cadwalader, Fabio Leonardi of Pillsbury, Stephen Gibbons of Raytheon, and Woo Lee of the U.S. Department of Justice.
This presented is aimed at AML/CTF practitioners who would need quick reminders of the basics of AML. Tools are not very useful if the underlying basics are unknown.
What is Money Laundering?
The act of concealing or disguising (laundering) of funds obtained through illegal activity
so that they appear to have been generated through legal, legitimate sources.
Types of Money- Laundering:
Structuring
Micro-Structuring
Cuckoo Smurfing
What is Structuring?
Structuring is one of the most common ways money launderers place money in the system
It is also known as smurfing. The individuals used to structure funds by organizations
doing money laundering are called Smurfs
Red Flags of Structuring:
Structuring red flags that banks and other financial institutions should look out for
include:
Cash transaction between $6,000 and $10,000
Frequent deposits for $9,000 or
Consecutive deposits that total $10,000
What is Micro-Structuring
Micro-structuring usually involves:
Checking accounts receiving cash deposits in amounts under $1,000 as infrequently as
several times a month
These deposits may be followed by ATM withdrawals in foreign countries
Red Flags of Micro-Structuring:
It has frequent deposits between $1,000 and $3,000
Makes it difficult to discern from normal account transactions
Easiest way to detect and prevent micro-structuring is to have accurate and up-to-date
Customer Due Diligence information is crucial to discover this type of structuring
Cuckoo-Smurfing
The term ‘cuckoo smurfing’ originated in Europe because of similarities between this
typology and the activities of the cuckoo bird
The perpetrators of this money laundering typology seek to transfer wealth through the bank
accounts of innocent third parties
Identity Theft Red Flags
opportunity to uncover identity theft is at the time of account opening
Examine the identification proof given by the customer carefully
Factors to look at carefully:
Does the picture on the ID match the person in front of you?
Does the year of birth match the person in front of you?
Does the identification match the state?
Is the identification real?
Use tools like Lexis Nexis to verify background information
Want to learn more about anti-money laundering process, its regulations, red flags and best
practices? ComplianceOnline webinars and seminars are a great training resource. Check out
the following links:
Red Flags of Money Laundering
Managing an Effective AML Compliance Program
Are You Doing Your BSA/AML Risk Assessment Properly?
How to Report under AML/BSA?
BSA/AML Compliance Checklist
How to Create Effective AML/BSA Compliance Program?
How to Develop Risk Models for AML Monitoring Program?
With a zero tolerance level in Money Laundering and associated large regulatory penalties for non compliance, Banks and other Financial Institutes are spending immense time, effort and money to achieve compliance. Needless to say, it is still not enough. The Black Swan can enter into any Financial Institute’s Branch on any given day and sting the Bank by surprise.
The implementation of a formal and a structured AML Mitigation and oversight system and processes that effectively identify, assess, and manage such risk within acceptable levels is a challenge. Therefore, awareness about the menace of money laundering and thorough understanding of the antimony laundering process and its current trends at all levels of staff of a bank/FI are ever growing necessities.
Awaiting your valuable nominations/enquiries to make the programs mutually beneficial and successful. Please email manoj.jain@riskpro.in or contact at 98337 67114 for more details.
Program Highlights
Let the experts guide you on the best practices in Anti Money Laundering
Perspective from RBI, FIU- IND, Income Tax and more
Global regulations around AML/KYC
Indian regulations and latest reforms
How to avoid any kind of surprises
Linking AML compliance to Reputation Risk, Social Media Risk
Dodd Frank Act, US Patriot Act
What it takes to say “NO” to profitable and abundant business
Speakers and Panelist
Guest speakers from Regulatory Authorities
Risk Management and Banking Experts
Manoj Jain, Director and Co Founder, Riskpro India
Hemant Seigell, Director, Riskpro India
R Muralidharan, ex DGM - Risk Management, Bank of Maharashtra
Hemlatha Mohan, ex Country Head ORM, ING Vysya Bank
Prasanna Rath, ex Head of Risk, TAIB Bank, Bahrain
Prominent AML experts as panelist
Money Laundering and Terrorist Financing in a Nutshell: Chapter OneMd. Moulude Hossain
Financial Crime is an increasing concern for all financial institutions, which is developing rapidly and equally together with technology. May be not limited to money laundering and terrorist financing, these two form of financial crime deserve to be attended with utmost care.
The evolving challenges of Money Laundering (ML) and Terrorist Financing (TF) lead the evolution of anti-money laundering and counter terrorist financing convention and regulations. These conventions give birth of several international organizations to combat the impact of ML and TF.
Financial crimes compliance and enforcement trends 2019Joseph V. Moreno
Panel presentation to the DC Bar Association on September 12, 2019, by Joseph Moreno of Cadwalader, Fabio Leonardi of Pillsbury, Stephen Gibbons of Raytheon, and Woo Lee of the U.S. Department of Justice.
This presented is aimed at AML/CTF practitioners who would need quick reminders of the basics of AML. Tools are not very useful if the underlying basics are unknown.
What is Money Laundering?
The act of concealing or disguising (laundering) of funds obtained through illegal activity
so that they appear to have been generated through legal, legitimate sources.
Types of Money- Laundering:
Structuring
Micro-Structuring
Cuckoo Smurfing
What is Structuring?
Structuring is one of the most common ways money launderers place money in the system
It is also known as smurfing. The individuals used to structure funds by organizations
doing money laundering are called Smurfs
Red Flags of Structuring:
Structuring red flags that banks and other financial institutions should look out for
include:
Cash transaction between $6,000 and $10,000
Frequent deposits for $9,000 or
Consecutive deposits that total $10,000
What is Micro-Structuring
Micro-structuring usually involves:
Checking accounts receiving cash deposits in amounts under $1,000 as infrequently as
several times a month
These deposits may be followed by ATM withdrawals in foreign countries
Red Flags of Micro-Structuring:
It has frequent deposits between $1,000 and $3,000
Makes it difficult to discern from normal account transactions
Easiest way to detect and prevent micro-structuring is to have accurate and up-to-date
Customer Due Diligence information is crucial to discover this type of structuring
Cuckoo-Smurfing
The term ‘cuckoo smurfing’ originated in Europe because of similarities between this
typology and the activities of the cuckoo bird
The perpetrators of this money laundering typology seek to transfer wealth through the bank
accounts of innocent third parties
Identity Theft Red Flags
opportunity to uncover identity theft is at the time of account opening
Examine the identification proof given by the customer carefully
Factors to look at carefully:
Does the picture on the ID match the person in front of you?
Does the year of birth match the person in front of you?
Does the identification match the state?
Is the identification real?
Use tools like Lexis Nexis to verify background information
Want to learn more about anti-money laundering process, its regulations, red flags and best
practices? ComplianceOnline webinars and seminars are a great training resource. Check out
the following links:
Red Flags of Money Laundering
Managing an Effective AML Compliance Program
Are You Doing Your BSA/AML Risk Assessment Properly?
How to Report under AML/BSA?
BSA/AML Compliance Checklist
How to Create Effective AML/BSA Compliance Program?
How to Develop Risk Models for AML Monitoring Program?
With a zero tolerance level in Money Laundering and associated large regulatory penalties for non compliance, Banks and other Financial Institutes are spending immense time, effort and money to achieve compliance. Needless to say, it is still not enough. The Black Swan can enter into any Financial Institute’s Branch on any given day and sting the Bank by surprise.
The implementation of a formal and a structured AML Mitigation and oversight system and processes that effectively identify, assess, and manage such risk within acceptable levels is a challenge. Therefore, awareness about the menace of money laundering and thorough understanding of the antimony laundering process and its current trends at all levels of staff of a bank/FI are ever growing necessities.
Awaiting your valuable nominations/enquiries to make the programs mutually beneficial and successful. Please email manoj.jain@riskpro.in or contact at 98337 67114 for more details.
Program Highlights
Let the experts guide you on the best practices in Anti Money Laundering
Perspective from RBI, FIU- IND, Income Tax and more
Global regulations around AML/KYC
Indian regulations and latest reforms
How to avoid any kind of surprises
Linking AML compliance to Reputation Risk, Social Media Risk
Dodd Frank Act, US Patriot Act
What it takes to say “NO” to profitable and abundant business
Speakers and Panelist
Guest speakers from Regulatory Authorities
Risk Management and Banking Experts
Manoj Jain, Director and Co Founder, Riskpro India
Hemant Seigell, Director, Riskpro India
R Muralidharan, ex DGM - Risk Management, Bank of Maharashtra
Hemlatha Mohan, ex Country Head ORM, ING Vysya Bank
Prasanna Rath, ex Head of Risk, TAIB Bank, Bahrain
Prominent AML experts as panelist
Bovill - the UK financial services regulatory consultancy - runs regular briefings. These are the slides from the February briefing on anti-money laundering. For more information visit http://www.bovill.com/FinancialCrime.aspx.
Information on the event is below:
Taking a company-wide approach to money laundering
“The FCA has made it very clear that responsibility for the overall culture of firms sits at the top. We need leaders and senior managers within the industry to set the tone for how their staff behave.”
Tracey McDermott, Director of Enforcement and Financial Crime, FCA
The regulator has recently reiterated their intention to carry out further thematic and enforcement work in financial crime. However, many firms still have a fragmented approach to managing the risks of money laundering.
The responsibility for preventing financial crime is shared across the firm from the back office to the boardroom. Firms need to take a company-wide approach to tackling money laundering to ensure they are complying with regulation and managing risks effectively.
Bovill’s briefing looked at Anti-Money Laundering (AML), covering:
• Governance arrangements: as the foundation for effective communication and issue resolution
• Risk management: the difficulties of negotiating the right level of due diligence for higher risk customers and what tools can be used to help with this process
• Systems and controls: ensuring that these are fit for regulatory purpose and are appropriately maintained within your firm.
A robust risk assessment process is central to maintaining a strong Anti-Money Laundering (AML) compliance program. In this new Accenture presentation we explore how financial services firms can set-up an effective process. Visit our fraud and financial crime blog post for more on AML risk assessment program: http://bit.ly/2aPlQQ7
Financial ethical issues presentation by Ihsanullah mansoor from Afghanistan,currently enrolled student of the University of Haripur ,Haripur KPK,Pakistan
Factoid based natural language question generation systemAnimesh Shaw
The proposed system addresses the generation of factoid or wh-questions from sentences in a corpus consisting of factual, descriptive and unbiased details. We discuss our heuristic algorithm for sentence simplification or pre-processing and the knowledge base extracted from previous step is stored in a structured format which assists us in further processing. We further discuss the sentence semantic relation which enables us to construct questions following certain recognizable patterns among different sentence entities, following by the evaluation of question generated.
Presentation on Investigating Emails to detect their spam free nature. Emails are a way to harm others or a social engineering way to fulfill wrong motives by some people. Awareness about the Forensics behind Email will give people an edge to protect themselves from fraud crimes.
Cyber Crimes Overview with special focus on Cyber crimes in India. Discussion related to some different types of Cyber Crimes. The presentation states the act about the growing concerns of Cyber Crime and also shows Statistical Data.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
4. Introduction to Financial Crimes (FC)
• “Financial crimes are crimes against property, involving the
unlawful conversion of the ownership of property (belonging
to one person) to one's own personal use and benefit.”
• FC may involve fraud (credit card fraud, corporate fraud,
securities fraud (including insider trading), bank fraud,
payment (point of sale) fraud etc.); theft; scams or
confidence tricks; tax evasion; identity theft; money
laundering; and counterfeiting, including the production
of Counterfeit money and consumer goods.
5. White-Collar-Crime
• White-collar crime refers to financially motivated nonviolent
crime committed by business and government professionals.
• Defined by sociologist Edwin Sutherland in 1939 as "a crime
committed by a person of respectability and high social status
in the course of his occupation“
• Examples :- fraud, forgery,
cybercrime, insider
Trading, etc.
7. Reasons for FC
• The Primary reason – “Money”
• Revenge, Grudge.
• Fun.
• Testing personal skillsets.
8. Why Financial Crime is so Widespread ?
• Lack of awareness.
• Lack of Knowledge and enthusiasm to learn.
• Unable to adapt to emerging technology.
• Lack of Training in Cyber Security.
• Carelessness.
• Tendency to stick to old methods.
9. Facts or Statistics on FC
• Cyber crimes in India have seen a sudden spurt.
• Cyber crimes have gone up by 60 per cent in 2012 at
3,500 as against 2,070 in the previous year.
• Age group involved – 18 to 30.
• Maharashtra topped the list with 561 (393 in 2011)
crimes, followed by Andhra Pradesh with 454 (372)
and Karnataka 437 (160)
10.
11. ..contd.
• “Financial offences dominate cyber crimes. Of late, we have
noticed an increase where the fraudsters hacking into email
accounts of companies and of customers. They read the entire
email thread and lure the customers to deposit money in a
fake account, duping both,” T.S. Uma Maheswara Rao,
Inspector of Police (Cyber Crime Police Station, Hyderabad),
told Business Line.
13. Equity Shares
• Equity is a part of a company, also known as stock or share. When you buy
shares of a company, you basically own a part of that company.
• Two Types :-
– Equity Shares : Both public and private corporations issue equity
shares. Equity shareholders are the owners of a company and initially
provide the equity capital to start the business.
– Preference Shares : A preference share is a type of share capital that
generally enables shareholders to fixed dividends ahead of the
company`s common shares and to a stated rupee value per share in
the event of liquidation
14. Sensex ( Bombay Stock Exchange
Sensitive Index)
• A figure indicating the relative prices of shares on the
Mumbai (Bombay) Stock Exchange.
SENSEX FOR TODAY = OLD VALUE X (NEW CAPITALIZATION/OLD
CAPITALIZATION)
15. Derivatives
Derivatives are financial
instruments whose value is
derived from the prices of one
or more underlying assets.
These underlying assets could
be equity shares, foreign
currencies, corn, wheat, silver
etc.
16. 1. Forward contracts are contracts between two parties whereby one party agrees
to sell to another party at some point in the future for a price agreed upon now.
2. Futures contract is an agreement between two parties to buy or sell an asset
at a certain time in the future at a certain price.
3. Option is a contract, which gives the buyer the right, but not the obligation to
buy or sell an underlying security at a specific price on or before a specific date.
Derivatives
DERIVATIVES
FORWARDS FUTURES OPTIONS
17. ESP (EARNINGS PER SHARE)
Earnings per share (EPS) is an important financial ratio that helps to compare the
profitability of various companies.
EPS = Net Profit (after tax and preference share dividend) /No. of shares
P/E RATIO
• The price to earnings ratio (P/E ratio) is a ratio of the share price of a company
to the earnings per share.
P / E ratio = Market price per share/Earnings per share
18. Debentures
A debenture is an instrument of debt executed by the
company acknowledging its obligation to repay a sum at a
specified rate and also carrying an interest.
21. Circuit Breaker
Circuit breaker is the system in which the share price of a
specific stock (or the index as a whole) rises or falls by
more than a specified percentage, trading is then
suspended for some time (or for the rest of the day) to let
the market cool down.
22. Insider Trading
An Insider is a person who, because of his connections
with a company, has access to unpublished price sensitive
information in respect of securities of a company.
23. Options
An option is a contract,
which gives the buyer the
right, but not the obligation
to buy or sell an underlying
security at a specific price on
or before a specific date.
‘Option’, as the word
suggests, is a choice given to
the investor to either honour
the contract; or ignore the
contract.
24. ..contd.
CALL OPTION: A Call Option is an option
to buy a stock at a specific price on or
before a certain date.
PUT OPTION: A Put Option is an option
to sell a stock at a specific price on or
before a certain date.
_______________________________
EUROPEAN OPTION: European options
give the holder the right, but not the
obligation, to buy or sell the underlying
instrument only on the expiry date.
AMERICAN OPTION: American options
give the holder the right, but not the
obligation, to buy or sell the underlying
instrument on or before the expiry date.
25. Hedging
A hedge is an investment that is taken out specifically to reduce or
cancel out the risk in another investment.
Hedging is a strategy designed to minimize exposure to an unwanted
business risk, while still allowing the business to profit from an
investment activity.
27. Tax Evasion
Tax evasion is using illegal means to avoid
paying taxes. Typically, tax evasion schemes
involve an individual or corporation
misrepresenting their income to the Internal
Revenue Service.
29. Online Bank Theft
• Hacking into bank servers.
• Stealing Customers data, account
information's, credit card details.
• Money Transfer from one account to
another account.
• Huge loss in economy.
30. Credit Card Frauds
• Credit card fraud is a wide-ranging term for theft
and fraud committed using or involving a payment card, such as
a credit card or debit card, as a fraudulent source of funds in a
transaction.
• The purpose may be to obtain goods without paying, or to
obtain unauthorized funds from an account.
32. Protection against Credit Card Frauds
• Don’t give your account number to anyone on the phone unless
you’ve made the call to a company you know to be reputable. If
you’ve never done business with them before, do an online search
first for reviews or complaints.
• Carry your cards separately from your wallet. It can minimize your
losses if someone steals your wallet or purse. And carry only the
card you need for that outing.
• During a transaction, keep your eye on your card. Make sure you
get it back before you walk away.
• Never sign a blank receipt. Draw a line through any blank spaces
above the total.
• Save your receipts to compare with your statement.
• Open your bills promptly — or check them online often — and
reconcile them with the purchases you’ve made.
• Report any questionable charges to the card issuer.
• Notify your card issuer if your address changes or if you will be
traveling.
• Don’t write your account number on the outside of an envelope.
33. Money Laundering
Money laundering is the process in which the proceeds
of crime are transformed into ostensibly
legitimate money or other assets.
37. Protection Against Financial Crimes
We’re continually reviewing our approach to ensure
we’re doing our best to stop money laundering,
terrorist financing and fraud and corruption. This
includes:
• Regularly or periodically reviewing and amending our
policies and procedures so that they remain relevant
and up-to-date
• Training ourselves on how to prevent, detect and react
to financial crime
• Checking our financial crime systems and controls to
ensure that they work efficiently and effectively
• Working closely with governments, law enforcement
agencies, regulators and the banking industry to share
best practice and contribute to ongoing initiatives
which combat crime risk.
38. References
1. http://en.wikipedia.org/wiki/Financial_crimes
2. http://en.wikipedia.org/wiki/White-collar_crime
3. http://www.havocscope.com/amount-of-money-laundered-
each-year/
4. http://en.wikipedia.org/wiki/Securities_fraud
5. Investigating Financial Crimes, Rohas Nagpal, Published by
ASCL (Asian School of Cyber Laws)
6. Data64 Presentation – Financial Crimes.
7. http://www.thehindubusinessline.com/industry-and-
economy/info-tech/financial-offences-top-cyber-crimes-in-
india/article4901219.ece
8. http://en.wikipedia.org/wiki/Credit_card_fraud