SlideShare a Scribd company logo
Preventing Fraud
Image shared under CC0
Our Agenda
1. Agenda
2. Objectives
3. Introductions
4. Activity 1: Class discussion
5. Activity 2: Review vocabulary
6. Activity 3: fill-in-the-blank
7. Activity 4: read a dialogue
8. Activity 5: discuss identity theft and fraud
9. Activity 6: case studies
Workshop Objectives
1. To learn 10 new words
2. To learn what identity theft and fraud is
3. To learn how we can avoid identity theft
and fraud
• What is your name?
• Where are you from?
Introductions
Join us in a group discussion
Activity 1
What do you know about identity theft or
fraud?
Group discussion
Have you ever been a victim of identity
theft or fraud?
Group discussion
Do you have any tips about how to prevent
identity theft or fraud?
Group discussion
Let’s review the vocabulary
Activity 2
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft financial institution
Financial recordscareless
Identity fraud credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial recordscareless
Identity fraud credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial recordscareless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
A crime where a criminal steals some of
your personal information such as name,
drivers license or social security number.
your personal information is used to make
purchases, withdraw cash, or set up new
accounts without your approval
Not careful with important things
to steal a person's mail
a report on a person's creditworthiness
that includes identifying information, credit
cards, late payments, bankruptcies, and
savings balances
Identity theft
financial institution
Financial records
careless
Identity fraud
credit report
personal information document monitor
mail theft
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information document monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity one: Vocabulary Review
Legal instruments such as mortgages,
contracts, deeds, options, wills, bills of sale,
etc.
Banks and other companies that deal with
money
financial documents that are used to record
and analyze the financial performance of a
business.
to keep a close watch on something
Information that can personally identify
someone, such as their name, email address or
billing information, or other data which can be
reasonably linked to such information.
financial institution
Financial records
personal information
document
monitor
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documentcarelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Check your _______________ to make sure nobody has used your credit card.
2. You must ____________________ your records on a regular basis.
3. Did you bring your passport and other important ________________ ?
4. I think I have been a victim of _________________ I have not received any mail for more
than 5 days. This is not usual because I usually get mail at least every second day!
5. Your ____________________ may be affected by missed payments.
documents
carelessidentity theft
financial records
Identity fraud
credit report
personal information
Financial institution
monitor
mail theft
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your _______________ over the phone? People can use that
information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
Financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your _______________ over the phone? People can use that
information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
carelessidentity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
Activity three: fill-in-the- blank
1. Remember that your ____________________ will never call you to get your personal
information.
2. Why did you give out your ______________________ over the phone? People can use
that information in illegal ways!
3. Be careful with your wallet. You don’t want to a victim of _________________ .
4. I can’t believe I lost my passport! How could I be so _______________ ?
5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t
take out a loan. I think I’ve become a victim of ___________________ .
careless
identity theft
Identity fraud
personal information
financial institution
Let’s read a dialogue
Activity 4
Listen to a dialogue:
Johanna
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Wow! That was a great seminar, wasn’t it?
It sure was. I learned so much! What was your favourite part?
Hmmmmmm …… I think it was the part about the importance of being
careful with our personal information.
So true. We really must be so careful with our documents.
No kidding. We sure don’t want to become a victim of identity theft or
identity fraud.
Hey! I had to step out during the part where the speaker was discussing
the difference between identity theft and identity fraud. Can you fill me in
on that?
Sure. Identity theft is when someone steals your personal information.
Identity fraud is when they actually use that information.
Got it. That makes sense. We really need to be careful!
Absolutely. We must not be careless with our personal information,
and we must monitor our financial records on a regular basis.
Listen to a dialogue:
Margarita
Johanna
Margarita
Johanna
Margarita
Johanna
Another point I heard that was so interesting was when he pointed out
was that a financial institution would never call us to get our personal
information.
True. They already have all kinds of information about us, so they
don’t need to call us for it. If your “bank” calls you for your birthdate,
you can be sure it’s fraud!
Yes. One thing I learned is that I really need to collect my mail everyday.
You know, sometimes I go away for days at a time without worrying about
my mail sitting in the mail box. From now on I will be sure to have a
neighbour collect it for me.
Great idea. You sure don’t want to become a victim of mail theft.
Anyway, I have to go and check my credit report!
Ok, I’ll see you later!
Activity 5
Let’s discuss identity
fraud
A. What is identity fraud?
• This is when your personal
information is actually used by the
person who stole it.
B. Identity Theft
How can it happen?
How it can happen
1. Dumpster Diving
Photo© by Blaine Roberts. Used with permission
How it can happen
2. Our own carelessness
Photo© by Blaine Roberts. Used with permission
How it can happen
3. Car break-ins
Image shared under CC0
How it can happen
4. Mail theft
Photo© by Blaine Roberts. Used with permission
How it can happen
5. Financial institution fraud
Photo© by Blaine Roberts. Used with permission
C. What kind of information is
commonly stolen?
Your full name
Your date of birth
Your social insurance number
Your full address
Your mother’s maiden name
User names and passwords
Driver’s license number
Credit card information
Bank account information
Signature
One more thing!
Photo© by Blaine Roberts. Used with permission
D. How is stolen information
used?
Access your bank accounts
Open new back accounts
Transfer account balances
Apply for loans
Make purchases
Hide criminal activity
Open new passports
E. What can we do to
help ensure our
personal information
is not stolen?
1. Monitor our records
Photo© by Blaine Roberts. Used with permission
2. Check our credit report for
unusual activity
Image shared under CC0
3. We should Investigate further
if ...
1. we receive
phone calls from a
collection agency
about unfamiliar
accounts
2. We
unexpectedly get
turned down for
credit
F. How can we
prevent Identity
theft?
1. Shred all personal documents
Photo© by Blaine Roberts. Used with permission
2. Monitor financial records
Photo© by Blaine Roberts. Used with permission
3. Do not give personal
information over the phone
Image shared under CC0
4. Don’t be careless with your
personal information
Image shared under CC0
5. Don’t carry too much personal
information with you
Photo© by Blaine Roberts. Used with permission
6. Keep all personal information
numbers in a safe place
Never write them on
the cards!
7. When you change your
address be sure to notify all your
financial institutions
Image shared under CC0
8. Shield the ATM and swipe
your own card!
Photo© by Blaine Roberts. Used with permission
9. Know when your credit
card payments are due
Image shared under CC0
Case studies
Activity 6
Case Studies
• Read each study and discuss
• what mistake was made (if any)
• What can be done now to fix the problem
• What can be done to prevent identity theft
Case Study One:
Miguel and his family are moving to a new
house. They have many personal financial
documents which they feel they no longer
need. Miguel’s wife asks what they should
do with the documents. Miguel suggests
tearing them up and throwing them into
the garbage.
Case Study Two:
Samantha keeps all her pin numbers in her
wallet. She has so many credit cards she
cannot remember all the numbers.
Case Study Three:
Su Jie’s “bank” called to confirm her address
and bank account numbers. Su Jie felt
comfortable giving her account number
over the phone because the caller seemed
to already know a lot about her. She
assumed it really was a lady from the
bank.
Case Study Four:
Bob and Diane always had a good credit
rating. One day they decided to apply for a
small loan for a car. They were surprised
when they got a call from the bank
informing them that their application was
declined.
Case Study Five:
Kamaljit and Vera are very good friends.
Vera has no money with her to buy
medicine for her child. Vera asks Kamaljit
if she could borrow her Debit card to buy
the medicine. Kamaljit lends Vera her bank
card and her pin number
Thanks for Attending!
See you next time!

More Related Content

What's hot

All about identity theft
All about identity theftAll about identity theft
All about identity theft
Mrwilson6
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
- Mark - Fullbright
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
Quicken Loans Zing Blog
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
Flora Runyenje
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
nahinworld
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
ijmnct
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
ijmnct
 
Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry
BrandonRuse1
 
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
BrandonRuse1
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Springboard
 
Guidance on verification 01092020
Guidance on verification 01092020Guidance on verification 01092020
Guidance on verification 01092020
Ziaullah Mirza
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
Springboard
 
Calling your credit card company
Calling your credit card company Calling your credit card company
Calling your credit card company
English Online Inc.
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
Ron Drew
 
Banking servics
Banking servicsBanking servics
Banking servics
jagannath ojha
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
Antonio Muniz Olan
 

What's hot (20)

All about identity theft
All about identity theftAll about identity theft
All about identity theft
 
Training For Bank Employees
Training For Bank EmployeesTraining For Bank Employees
Training For Bank Employees
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Trilegiant 1
Trilegiant 1Trilegiant 1
Trilegiant 1
 
All about identity_theft
All about identity_theftAll about identity_theft
All about identity_theft
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Introduction of cyber security
Introduction of cyber securityIntroduction of cyber security
Introduction of cyber security
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MININGAN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING
 
Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry Age Verificationn in the Alcohol industry
Age Verificationn in the Alcohol industry
 
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods IndustryMoney Laundering in the Art, Collectibles, and Luxury Goods Industry
Money Laundering in the Art, Collectibles, and Luxury Goods Industry
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Guidance on verification 01092020
Guidance on verification 01092020Guidance on verification 01092020
Guidance on verification 01092020
 
Identity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good NameIdentity Theft: Protecting & Restoring Your Good Name
Identity Theft: Protecting & Restoring Your Good Name
 
Calling your credit card company
Calling your credit card company Calling your credit card company
Calling your credit card company
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Banking servics
Banking servicsBanking servics
Banking servics
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
IDSHield Services and Features
IDSHield Services and FeaturesIDSHield Services and Features
IDSHield Services and Features
 

Viewers also liked

ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
BillyCheuk
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
BillyCheuk
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by SvetlanaVidaB
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)
gj4u
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
John Hall, CPA - Keynote Speaker Consultant
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
Jason Lundell
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
Scott Mongeau
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio AnalysisDharan178
 

Viewers also liked (8)

ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 IntroductionACCA-IIA Singapore Seminar 2015 Part 1 Introduction
ACCA-IIA Singapore Seminar 2015 Part 1 Introduction
 
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governanceACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
ACCA-IIA Singapore Seminar 2015 part 2 fraud risk governance
 
Chapter 14 by Svetlana
Chapter 14 by SvetlanaChapter 14 by Svetlana
Chapter 14 by Svetlana
 
Fraud+Indicators(1)
Fraud+Indicators(1)Fraud+Indicators(1)
Fraud+Indicators(1)
 
Fraud And Internal Controls Linked In April 2011
Fraud And Internal Controls   Linked In April 2011Fraud And Internal Controls   Linked In April 2011
Fraud And Internal Controls Linked In April 2011
 
Fraud: Understanding Fraud and Our Responsibilities
Fraud:  Understanding Fraud and Our ResponsibilitiesFraud:  Understanding Fraud and Our Responsibilities
Fraud: Understanding Fraud and Our Responsibilities
 
ACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and MitigationACFE Presentation on Analytics for Fraud Detection and Mitigation
ACFE Presentation on Analytics for Fraud Detection and Mitigation
 
Ratio Analysis
Ratio AnalysisRatio Analysis
Ratio Analysis
 

Similar to Preventing fraud 2

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
- Mark - Fullbright
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
- Mark - Fullbright
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
- Mark - Fullbright
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
Sandy Kleinhenz
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
- Mark - Fullbright
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
Deb Vosejpka
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
gaby350
 
Identity theft
Identity theftIdentity theft
Identity theft
Muncie_Library
 
Identity Theft
Identity TheftIdentity Theft
Identity Theftsarakr00
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
- Mark - Fullbright
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
IdentityForce
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
- Mark - Fullbright
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
hewie
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
Cost U Less Direct
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015James Kane
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
hewie
 

Similar to Preventing fraud 2 (20)

Taking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is StolenTaking Charge: What to Do If Your Identity Is Stolen
Taking Charge: What to Do If Your Identity Is Stolen
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity Theft and You
Identity Theft and YouIdentity Theft and You
Identity Theft and You
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft Overview
Identity Theft OverviewIdentity Theft Overview
Identity Theft Overview
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Fight Back Against Identity Theft 98160
Fight Back Against Identity Theft  98160Fight Back Against Identity Theft  98160
Fight Back Against Identity Theft 98160
 
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 EditionResolving Consumer Identity Theft for Foster Youth 2013 Edition
Resolving Consumer Identity Theft for Foster Youth 2013 Edition
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentity Theft 101: How It Happens & What You Can Do To Prevent It
Identity Theft 101: How It Happens & What You Can Do To Prevent It
 
Identity Theft Toolkit
Identity Theft ToolkitIdentity Theft Toolkit
Identity Theft Toolkit
 
IDShield
IDShieldIDShield
IDShield
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
How to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity TheftHow to Minimize the Damage of Identity Theft
How to Minimize the Damage of Identity Theft
 
ID Theft Final Oct 2015
ID Theft Final Oct 2015ID Theft Final Oct 2015
ID Theft Final Oct 2015
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 

More from English Online Inc.

DemonstrativePronounsCLB3-4EnglishOnline
DemonstrativePronounsCLB3-4EnglishOnlineDemonstrativePronounsCLB3-4EnglishOnline
DemonstrativePronounsCLB3-4EnglishOnline
English Online Inc.
 
Rent or own - Based on Family Idioms.pptx
Rent or own - Based on Family Idioms.pptxRent or own - Based on Family Idioms.pptx
Rent or own - Based on Family Idioms.pptx
English Online Inc.
 
IrregularVerbs2.0CLB3-4EnglishOnline.pptx
IrregularVerbs2.0CLB3-4EnglishOnline.pptxIrregularVerbs2.0CLB3-4EnglishOnline.pptx
IrregularVerbs2.0CLB3-4EnglishOnline.pptx
English Online Inc.
 
AdverbsofFrequencyLunch&LearnEnglishOnline.pptx
AdverbsofFrequencyLunch&LearnEnglishOnline.pptxAdverbsofFrequencyLunch&LearnEnglishOnline.pptx
AdverbsofFrequencyLunch&LearnEnglishOnline.pptx
English Online Inc.
 
BBQ - Based on Meat Idioms.pptx - A language Circle Lesson
BBQ - Based on Meat Idioms.pptx - A language Circle LessonBBQ - Based on Meat Idioms.pptx - A language Circle Lesson
BBQ - Based on Meat Idioms.pptx - A language Circle Lesson
English Online Inc.
 
IndefinitePronounsEnglishOnlineINC3-4.pptx
IndefinitePronounsEnglishOnlineINC3-4.pptxIndefinitePronounsEnglishOnlineINC3-4.pptx
IndefinitePronounsEnglishOnlineINC3-4.pptx
English Online Inc.
 
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptxRegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
English Online Inc.
 
ModalsNecessityObligationEnglishOnline.pptx
ModalsNecessityObligationEnglishOnline.pptxModalsNecessityObligationEnglishOnline.pptx
ModalsNecessityObligationEnglishOnline.pptx
English Online Inc.
 
Grandparents - Based on Relationship Idioms.pptx
Grandparents - Based on Relationship Idioms.pptxGrandparents - Based on Relationship Idioms.pptx
Grandparents - Based on Relationship Idioms.pptx
English Online Inc.
 
SimplePresentPresentProgressive(CLB3-4)EO.pptx
SimplePresentPresentProgressive(CLB3-4)EO.pptxSimplePresentPresentProgressive(CLB3-4)EO.pptx
SimplePresentPresentProgressive(CLB3-4)EO.pptx
English Online Inc.
 
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptx
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptxSleep and Health - Based on Health and Fitness Idioms Set 2.pptx
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptx
English Online Inc.
 
PronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptxPronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptx
English Online Inc.
 
RegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptxRegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptx
English Online Inc.
 
Animal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms LessonAnimal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms Lesson
English Online Inc.
 
AdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptxAdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptx
English Online Inc.
 
TheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptxTheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptx
English Online Inc.
 
GradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptxGradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptx
English Online Inc.
 
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptxPartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
English Online Inc.
 
Justice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptxJustice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptx
English Online Inc.
 
Landing on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptxLanding on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptx
English Online Inc.
 

More from English Online Inc. (20)

DemonstrativePronounsCLB3-4EnglishOnline
DemonstrativePronounsCLB3-4EnglishOnlineDemonstrativePronounsCLB3-4EnglishOnline
DemonstrativePronounsCLB3-4EnglishOnline
 
Rent or own - Based on Family Idioms.pptx
Rent or own - Based on Family Idioms.pptxRent or own - Based on Family Idioms.pptx
Rent or own - Based on Family Idioms.pptx
 
IrregularVerbs2.0CLB3-4EnglishOnline.pptx
IrregularVerbs2.0CLB3-4EnglishOnline.pptxIrregularVerbs2.0CLB3-4EnglishOnline.pptx
IrregularVerbs2.0CLB3-4EnglishOnline.pptx
 
AdverbsofFrequencyLunch&LearnEnglishOnline.pptx
AdverbsofFrequencyLunch&LearnEnglishOnline.pptxAdverbsofFrequencyLunch&LearnEnglishOnline.pptx
AdverbsofFrequencyLunch&LearnEnglishOnline.pptx
 
BBQ - Based on Meat Idioms.pptx - A language Circle Lesson
BBQ - Based on Meat Idioms.pptx - A language Circle LessonBBQ - Based on Meat Idioms.pptx - A language Circle Lesson
BBQ - Based on Meat Idioms.pptx - A language Circle Lesson
 
IndefinitePronounsEnglishOnlineINC3-4.pptx
IndefinitePronounsEnglishOnlineINC3-4.pptxIndefinitePronounsEnglishOnlineINC3-4.pptx
IndefinitePronounsEnglishOnlineINC3-4.pptx
 
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptxRegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
RegularVerbsEnglishOnlineCLB3-4L/Learn.pptx
 
ModalsNecessityObligationEnglishOnline.pptx
ModalsNecessityObligationEnglishOnline.pptxModalsNecessityObligationEnglishOnline.pptx
ModalsNecessityObligationEnglishOnline.pptx
 
Grandparents - Based on Relationship Idioms.pptx
Grandparents - Based on Relationship Idioms.pptxGrandparents - Based on Relationship Idioms.pptx
Grandparents - Based on Relationship Idioms.pptx
 
SimplePresentPresentProgressive(CLB3-4)EO.pptx
SimplePresentPresentProgressive(CLB3-4)EO.pptxSimplePresentPresentProgressive(CLB3-4)EO.pptx
SimplePresentPresentProgressive(CLB3-4)EO.pptx
 
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptx
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptxSleep and Health - Based on Health and Fitness Idioms Set 2.pptx
Sleep and Health - Based on Health and Fitness Idioms Set 2.pptx
 
PronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptxPronouncingChShSoundsEnglishOnlineInc.pptx
PronouncingChShSoundsEnglishOnlineInc.pptx
 
RegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptxRegisterALessonforCLB5+LearnersEOINC.pptx
RegisterALessonforCLB5+LearnersEOINC.pptx
 
Animal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms LessonAnimal Idioms - A Canadian Idioms Lesson
Animal Idioms - A Canadian Idioms Lesson
 
AdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptxAdverbsofMannerEnglishOnlineCLB5plus.pptx
AdverbsofMannerEnglishOnlineCLB5plus.pptx
 
TheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptxTheSimplePresentEnglishOnlineLunch&Learn.pptx
TheSimplePresentEnglishOnlineLunch&Learn.pptx
 
GradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptxGradableUngradableAdjectivesEnglishO.pptx
GradableUngradableAdjectivesEnglishO.pptx
 
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptxPartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
PartsofSpeech(CLB3-4)EnglishOnlineInc.pptx
 
Justice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptxJustice is blind - Based on Sorry Idioms.pptx
Justice is blind - Based on Sorry Idioms.pptx
 
Landing on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptxLanding on the Moon - based on Moon Idioms.pptx
Landing on the Moon - based on Moon Idioms.pptx
 

Recently uploaded

一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Henry Tapper
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
DOT TECH
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
DOT TECH
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
ManthanBhardwaj4
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc ACA ACIB FCTI FCFIP CFE
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
Transkredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptxTranskredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptx
jenomjaneh
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
DOT TECH
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
DOT TECH
 
how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.
DOT TECH
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
DOT TECH
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 

Recently uploaded (20)

一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdfPensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
Pensions and housing - Pensions PlayPen - 4 June 2024 v3 (1).pdf
 
how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.how can i use my minded pi coins I need some funds.
how can i use my minded pi coins I need some funds.
 
how to sell pi coins on Binance exchange
how to sell pi coins on Binance exchangehow to sell pi coins on Binance exchange
how to sell pi coins on Binance exchange
 
Analyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar modelAnalyzing the instability of equilibrium in thr harrod domar model
Analyzing the instability of equilibrium in thr harrod domar model
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
Transkredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptxTranskredit Finance Company Products Presentation (1).pptx
Transkredit Finance Company Products Presentation (1).pptx
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
how can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYChow can I sell pi coins after successfully completing KYC
how can I sell pi coins after successfully completing KYC
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
 
how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.how to sell pi coins in all Africa Countries.
how to sell pi coins in all Africa Countries.
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.how to sell pi coins at high rate quickly.
how to sell pi coins at high rate quickly.
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 

Preventing fraud 2

  • 2. Our Agenda 1. Agenda 2. Objectives 3. Introductions 4. Activity 1: Class discussion 5. Activity 2: Review vocabulary 6. Activity 3: fill-in-the-blank 7. Activity 4: read a dialogue 8. Activity 5: discuss identity theft and fraud 9. Activity 6: case studies
  • 3. Workshop Objectives 1. To learn 10 new words 2. To learn what identity theft and fraud is 3. To learn how we can avoid identity theft and fraud
  • 4. • What is your name? • Where are you from? Introductions
  • 5. Join us in a group discussion Activity 1
  • 6. What do you know about identity theft or fraud? Group discussion
  • 7. Have you ever been a victim of identity theft or fraud? Group discussion
  • 8. Do you have any tips about how to prevent identity theft or fraud? Group discussion
  • 9. Let’s review the vocabulary Activity 2
  • 10. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial recordscareless Identity fraud credit report personal information document monitor mail theft
  • 11. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial recordscareless Identity fraud credit report personal information document monitor mail theft
  • 12. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial recordscareless Identity fraud credit report personal information document monitor mail theft
  • 13. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial records careless Identity fraud credit report personal information document monitor mail theft
  • 14. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial records careless Identity fraud credit report personal information document monitor mail theft
  • 15. Activity one: Vocabulary Review A crime where a criminal steals some of your personal information such as name, drivers license or social security number. your personal information is used to make purchases, withdraw cash, or set up new accounts without your approval Not careful with important things to steal a person's mail a report on a person's creditworthiness that includes identifying information, credit cards, late payments, bankruptcies, and savings balances Identity theft financial institution Financial records careless Identity fraud credit report personal information document monitor mail theft
  • 16. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 17. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 18. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 19. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 20. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 21. Activity one: Vocabulary Review Legal instruments such as mortgages, contracts, deeds, options, wills, bills of sale, etc. Banks and other companies that deal with money financial documents that are used to record and analyze the financial performance of a business. to keep a close watch on something Information that can personally identify someone, such as their name, email address or billing information, or other data which can be reasonably linked to such information. financial institution Financial records personal information document monitor
  • 22. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documentcarelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 23. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documentcarelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 24. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documentcarelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 25. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documents carelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 26. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documents carelessidentity theft financial records Identity fraud credit report personal information financial institution monitor mail theft
  • 27. Activity three: fill-in-the- blank 1. Check your _______________ to make sure nobody has used your credit card. 2. You must ____________________ your records on a regular basis. 3. Did you bring your passport and other important ________________ ? 4. I think I have been a victim of _________________ I have not received any mail for more than 5 days. This is not usual because I usually get mail at least every second day! 5. Your ____________________ may be affected by missed payments. documents carelessidentity theft financial records Identity fraud credit report personal information Financial institution monitor mail theft
  • 28. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your _______________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . carelessidentity theft Identity fraud personal information Financial institution
  • 29. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your _______________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . carelessidentity theft Identity fraud personal information financial institution
  • 30. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . carelessidentity theft Identity fraud personal information financial institution
  • 31. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . careless identity theft Identity fraud personal information financial institution
  • 32. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . careless identity theft Identity fraud personal information financial institution
  • 33. Activity three: fill-in-the- blank 1. Remember that your ____________________ will never call you to get your personal information. 2. Why did you give out your ______________________ over the phone? People can use that information in illegal ways! 3. Be careful with your wallet. You don’t want to a victim of _________________ . 4. I can’t believe I lost my passport! How could I be so _______________ ? 5. The bank just called me to tell that I missed a loan payment. The problem is that I didn’t take out a loan. I think I’ve become a victim of ___________________ . careless identity theft Identity fraud personal information financial institution
  • 34. Let’s read a dialogue Activity 4
  • 35. Listen to a dialogue: Johanna Margarita Johanna Margarita Johanna Margarita Johanna Margarita Johanna Wow! That was a great seminar, wasn’t it? It sure was. I learned so much! What was your favourite part? Hmmmmmm …… I think it was the part about the importance of being careful with our personal information. So true. We really must be so careful with our documents. No kidding. We sure don’t want to become a victim of identity theft or identity fraud. Hey! I had to step out during the part where the speaker was discussing the difference between identity theft and identity fraud. Can you fill me in on that? Sure. Identity theft is when someone steals your personal information. Identity fraud is when they actually use that information. Got it. That makes sense. We really need to be careful! Absolutely. We must not be careless with our personal information, and we must monitor our financial records on a regular basis.
  • 36. Listen to a dialogue: Margarita Johanna Margarita Johanna Margarita Johanna Another point I heard that was so interesting was when he pointed out was that a financial institution would never call us to get our personal information. True. They already have all kinds of information about us, so they don’t need to call us for it. If your “bank” calls you for your birthdate, you can be sure it’s fraud! Yes. One thing I learned is that I really need to collect my mail everyday. You know, sometimes I go away for days at a time without worrying about my mail sitting in the mail box. From now on I will be sure to have a neighbour collect it for me. Great idea. You sure don’t want to become a victim of mail theft. Anyway, I have to go and check my credit report! Ok, I’ll see you later!
  • 37. Activity 5 Let’s discuss identity fraud
  • 38. A. What is identity fraud? • This is when your personal information is actually used by the person who stole it.
  • 39. B. Identity Theft How can it happen?
  • 40. How it can happen 1. Dumpster Diving Photo© by Blaine Roberts. Used with permission
  • 41. How it can happen 2. Our own carelessness Photo© by Blaine Roberts. Used with permission
  • 42. How it can happen 3. Car break-ins Image shared under CC0
  • 43. How it can happen 4. Mail theft Photo© by Blaine Roberts. Used with permission
  • 44. How it can happen 5. Financial institution fraud Photo© by Blaine Roberts. Used with permission
  • 45. C. What kind of information is commonly stolen? Your full name Your date of birth Your social insurance number Your full address Your mother’s maiden name User names and passwords Driver’s license number Credit card information Bank account information Signature
  • 46. One more thing! Photo© by Blaine Roberts. Used with permission
  • 47. D. How is stolen information used? Access your bank accounts Open new back accounts Transfer account balances Apply for loans Make purchases Hide criminal activity Open new passports
  • 48. E. What can we do to help ensure our personal information is not stolen?
  • 49. 1. Monitor our records Photo© by Blaine Roberts. Used with permission
  • 50. 2. Check our credit report for unusual activity Image shared under CC0
  • 51. 3. We should Investigate further if ... 1. we receive phone calls from a collection agency about unfamiliar accounts 2. We unexpectedly get turned down for credit
  • 52. F. How can we prevent Identity theft?
  • 53. 1. Shred all personal documents Photo© by Blaine Roberts. Used with permission
  • 54. 2. Monitor financial records Photo© by Blaine Roberts. Used with permission
  • 55. 3. Do not give personal information over the phone Image shared under CC0
  • 56. 4. Don’t be careless with your personal information Image shared under CC0
  • 57. 5. Don’t carry too much personal information with you Photo© by Blaine Roberts. Used with permission
  • 58. 6. Keep all personal information numbers in a safe place Never write them on the cards!
  • 59. 7. When you change your address be sure to notify all your financial institutions Image shared under CC0
  • 60. 8. Shield the ATM and swipe your own card! Photo© by Blaine Roberts. Used with permission
  • 61. 9. Know when your credit card payments are due Image shared under CC0
  • 63. Case Studies • Read each study and discuss • what mistake was made (if any) • What can be done now to fix the problem • What can be done to prevent identity theft
  • 64. Case Study One: Miguel and his family are moving to a new house. They have many personal financial documents which they feel they no longer need. Miguel’s wife asks what they should do with the documents. Miguel suggests tearing them up and throwing them into the garbage.
  • 65. Case Study Two: Samantha keeps all her pin numbers in her wallet. She has so many credit cards she cannot remember all the numbers.
  • 66. Case Study Three: Su Jie’s “bank” called to confirm her address and bank account numbers. Su Jie felt comfortable giving her account number over the phone because the caller seemed to already know a lot about her. She assumed it really was a lady from the bank.
  • 67. Case Study Four: Bob and Diane always had a good credit rating. One day they decided to apply for a small loan for a car. They were surprised when they got a call from the bank informing them that their application was declined.
  • 68. Case Study Five: Kamaljit and Vera are very good friends. Vera has no money with her to buy medicine for her child. Vera asks Kamaljit if she could borrow her Debit card to buy the medicine. Kamaljit lends Vera her bank card and her pin number
  • 69. Thanks for Attending! See you next time!