SlideShare una empresa de Scribd logo
1 de 16
1
CREDIT CARD FRAUDS
Lost or Stolen Card – 48%
Identity Theft – 15%
Skimming – 14%
Counterfeit Card – 12%
Phishing – 6%
Other – 5%
2
Stolen
Identity Theft
Skimming
Counterfeit
Phishing
Other
Stolen Identity Theft Skimming Counterfeit Phishing Other
STOLEN CARDS
• When a credit card is lost or stolen, it may be used for illegal
purchases until the holder notifies the issuing bank and the bank
puts a block on the account.
• It is possible for a thief to make unauthorized purchases on a card
before the card is canceled.
3
ID THEFT
• Application fraud
Application fraud takes place when a person uses stolen or fake
documents to open an account in another person's name. Criminals
may steal documents such as utility bills and bank statements to build
up useful personal information. Alternatively, they may create fake
documents. With this information, they could open a credit card
account or loan account in the victim's name, and then fully draw it.
4
ID THEFT
• ACCOUNT TAKEOVER
An account takeover occurs when criminals pose as a genuine customer,
gain control of an account and then makes unauthorized transactions.
A fraudster uses parts of the victim’s identity such as an email address to
gain access to financial accounts. This individual then intercepts
communication about the account to keep the victim blind to any threats.
5
ID THIEVES HARM VICTIMS BY-
Using their names and other personal information to open new credit
accounts.
Accessing existing credit and bank accounts to make unauthorized
purchases.
Victims of ID theft are not held liable for losses, but it takes time and
effort for victims to prove fraud and clean up the chaos.
6
SKIMMING
7
When any person make illegal
copies of credit or debit cards using a
“skimmer” device that captures credit
card numbers and other account information.
The stolen credit information is used to make
purchases by phone and internet, or
to make counterfeit cards.
PHISHING
• Phishing is a financial crime that starts with
massive numbers of deceptive spam e-mails.
• These e-mails look like they come from your
bank.
• But they are just a trick to get account numbers
and passwords.
• Refer section 66 of Information Technology
Act 2000.
8
 PROTECT YOUR ACCOUNT NUMBERS
• Never write your credit card number on post cards or on the outside of
envelopes.
• Never provide your card number on the phone, unless you know it’s a
legitimate, reputable business.
• Never give your account number to anyone who calls you on the phone
or sends you an e-mail.
9
PRECAUTIONARY MEASURES TO AVOID
CREDIT CARD FRAUDS
 INTERNET SAFEGUARDS
• Avoid providing your credit card number to websites offering “free
access”.
• Install a firewall in your computer to prevent unauthorized access from
hackers.
10
 WATCH YOUR CREDIT CARD
• Watch closely when store or restaurant employees handle your
card to make sure they are not copying or “Skimming” your
credit card number.
• After you make a purchase and your card is handed back to you,
make sure the card is yours.
 PROTECT YOUR WALLET OR PURSE
• Keep a close eye on your belongings.
• Never carry all your credit cards.
• Bring only the 1 or 2 cards you might need.
• Carry your credit cards separate from your wallet.
• If your wallet or purse is lost or stolen, call your credit card issuers
immediately.
11
 BILLING STATEMENTS
• Review credit card statements closely on the day they arrive.
• Report any questionable charges to your card issuer immediately.
• A missing credit card statement may indicate stolen mail.
Contact your card issuer right away if your bill doesn’t arrive around the
usual date.
• If you have a computer, consider signing up for online account access.
This way you can track your account activity between statements.
12
 IN CASE YOUR CARD IS LOST OR STOLEN
Record all your account numbers and company contact
information and keep the record in a secure place.
That way you can easily find whom to call to report the loss.
Never write down your personal identification number (PIN).
Never give your PIN to anyone.
13
REPORTING CREDIT CARD FRAUD
To report credit card fraud
 Inform your bank about the unauthorized transaction as soon as possible, maximum
within 3 days of occurrence. You can inform by contacting them via Toll Free number,
customer care number, phone banking, SMS, email, or by visiting any closest branch of
the same bank
Banks’ loss and fraud reporting system will immediately acknowledge your complaint
and share a registered complaint number for your reference to keep a track of further
developments.
14
15
Source – Livemint.com
THANK YOU
16

Más contenido relacionado

La actualidad más candente

Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Dinidu Weeraratne
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION K Srinivas Rao
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesIJSRD
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017N F
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperGarvit Burad
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learningijtsrd
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine LearningScaleway
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detectionijtsrd
 

La actualidad más candente (20)

Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
Banking Frauds - An analysis of Banking Frauds, causes and possible preventiv...
 
CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION CREDIT CARD FRAUD DETECTION
CREDIT CARD FRAUD DETECTION
 
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining TechniquesA Survey of Online Credit Card Fraud Detection using Data Mining Techniques
A Survey of Online Credit Card Fraud Detection using Data Mining Techniques
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Internet fraud #scichallenge2017
Internet fraud #scichallenge2017Internet fraud #scichallenge2017
Internet fraud #scichallenge2017
 
Credit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research PaperCredit Card Fraudulent Transaction Detection Research Paper
Credit Card Fraudulent Transaction Detection Research Paper
 
Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age Identity Theft and How to Prevent Them in the Digital Age
Identity Theft and How to Prevent Them in the Digital Age
 
Fraud detection
Fraud detectionFraud detection
Fraud detection
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
A Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine LearningA Study on Credit Card Fraud Detection using Machine Learning
A Study on Credit Card Fraud Detection using Machine Learning
 
Fraud detection with Machine Learning
Fraud detection with Machine LearningFraud detection with Machine Learning
Fraud detection with Machine Learning
 
Credit Card Fraud Detection
Credit Card Fraud DetectionCredit Card Fraud Detection
Credit Card Fraud Detection
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 

Similar a Credit card frauds

How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims- Mark - Fullbright
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraudshreemala1
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraudscamtools
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Credit card scams
Credit card scamsCredit card scams
Credit card scamsscamtools
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 

Similar a Credit card frauds (20)

Credit Card Fraud
Credit Card FraudCredit Card Fraud
Credit Card Fraud
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Identity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for VictimsIdentity Theft and Phishing - Canadian Resource Centre for Victims
Identity Theft and Phishing - Canadian Resource Centre for Victims
 
Bank frauds
Bank fraudsBank frauds
Bank frauds
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 
Credit_Card_Fraud.ppt
Credit_Card_Fraud.pptCredit_Card_Fraud.ppt
Credit_Card_Fraud.ppt
 
Credit card fraud
Credit card fraudCredit card fraud
Credit card fraud
 
Credit_Card_Fraud.ppt
Credit_Card_Fraud.pptCredit_Card_Fraud.ppt
Credit_Card_Fraud.ppt
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraud
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Credit card scams
Credit card scamsCredit card scams
Credit card scams
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 

Último

如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书Fs Las
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书Fir sss
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书Fir L
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm2020000445musaib
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labourBhavikaGholap1
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notesPRATIKNAYAK31
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书Fir L
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书Sir Lt
 

Último (20)

如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
如何办理(Lincoln文凭证书)林肯大学毕业证学位证书
 
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
Russian Call Girls Service Gomti Nagar \ 9548273370 Indian Call Girls Service...
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 6 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
如何办理佛蒙特大学毕业证学位证书
 如何办理佛蒙特大学毕业证学位证书 如何办理佛蒙特大学毕业证学位证书
如何办理佛蒙特大学毕业证学位证书
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
如何办理新加坡南洋理工大学毕业证(本硕)NTU学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
Ricky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in MidlothianRicky French: Championing Truth and Change in Midlothian
Ricky French: Championing Truth and Change in Midlothian
 
Essentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmmEssentials of a Valid Transfer.pptxmmmmmm
Essentials of a Valid Transfer.pptxmmmmmm
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
THE FACTORIES ACT,1948 (2).pptx labour
THE FACTORIES ACT,1948 (2).pptx   labourTHE FACTORIES ACT,1948 (2).pptx   labour
THE FACTORIES ACT,1948 (2).pptx labour
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Mediation ppt for study materials. notes
Mediation ppt for study materials. notesMediation ppt for study materials. notes
Mediation ppt for study materials. notes
 
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
如何办理新西兰奥克兰商学院毕业证(本硕)AIS学位证书
 
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书 如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
如何办理(MSU文凭证书)密歇根州立大学毕业证学位证书
 

Credit card frauds

  • 1. 1
  • 2. CREDIT CARD FRAUDS Lost or Stolen Card – 48% Identity Theft – 15% Skimming – 14% Counterfeit Card – 12% Phishing – 6% Other – 5% 2 Stolen Identity Theft Skimming Counterfeit Phishing Other Stolen Identity Theft Skimming Counterfeit Phishing Other
  • 3. STOLEN CARDS • When a credit card is lost or stolen, it may be used for illegal purchases until the holder notifies the issuing bank and the bank puts a block on the account. • It is possible for a thief to make unauthorized purchases on a card before the card is canceled. 3
  • 4. ID THEFT • Application fraud Application fraud takes place when a person uses stolen or fake documents to open an account in another person's name. Criminals may steal documents such as utility bills and bank statements to build up useful personal information. Alternatively, they may create fake documents. With this information, they could open a credit card account or loan account in the victim's name, and then fully draw it. 4
  • 5. ID THEFT • ACCOUNT TAKEOVER An account takeover occurs when criminals pose as a genuine customer, gain control of an account and then makes unauthorized transactions. A fraudster uses parts of the victim’s identity such as an email address to gain access to financial accounts. This individual then intercepts communication about the account to keep the victim blind to any threats. 5
  • 6. ID THIEVES HARM VICTIMS BY- Using their names and other personal information to open new credit accounts. Accessing existing credit and bank accounts to make unauthorized purchases. Victims of ID theft are not held liable for losses, but it takes time and effort for victims to prove fraud and clean up the chaos. 6
  • 7. SKIMMING 7 When any person make illegal copies of credit or debit cards using a “skimmer” device that captures credit card numbers and other account information. The stolen credit information is used to make purchases by phone and internet, or to make counterfeit cards.
  • 8. PHISHING • Phishing is a financial crime that starts with massive numbers of deceptive spam e-mails. • These e-mails look like they come from your bank. • But they are just a trick to get account numbers and passwords. • Refer section 66 of Information Technology Act 2000. 8
  • 9.  PROTECT YOUR ACCOUNT NUMBERS • Never write your credit card number on post cards or on the outside of envelopes. • Never provide your card number on the phone, unless you know it’s a legitimate, reputable business. • Never give your account number to anyone who calls you on the phone or sends you an e-mail. 9 PRECAUTIONARY MEASURES TO AVOID CREDIT CARD FRAUDS
  • 10.  INTERNET SAFEGUARDS • Avoid providing your credit card number to websites offering “free access”. • Install a firewall in your computer to prevent unauthorized access from hackers. 10  WATCH YOUR CREDIT CARD • Watch closely when store or restaurant employees handle your card to make sure they are not copying or “Skimming” your credit card number. • After you make a purchase and your card is handed back to you, make sure the card is yours.
  • 11.  PROTECT YOUR WALLET OR PURSE • Keep a close eye on your belongings. • Never carry all your credit cards. • Bring only the 1 or 2 cards you might need. • Carry your credit cards separate from your wallet. • If your wallet or purse is lost or stolen, call your credit card issuers immediately. 11
  • 12.  BILLING STATEMENTS • Review credit card statements closely on the day they arrive. • Report any questionable charges to your card issuer immediately. • A missing credit card statement may indicate stolen mail. Contact your card issuer right away if your bill doesn’t arrive around the usual date. • If you have a computer, consider signing up for online account access. This way you can track your account activity between statements. 12
  • 13.  IN CASE YOUR CARD IS LOST OR STOLEN Record all your account numbers and company contact information and keep the record in a secure place. That way you can easily find whom to call to report the loss. Never write down your personal identification number (PIN). Never give your PIN to anyone. 13
  • 14. REPORTING CREDIT CARD FRAUD To report credit card fraud  Inform your bank about the unauthorized transaction as soon as possible, maximum within 3 days of occurrence. You can inform by contacting them via Toll Free number, customer care number, phone banking, SMS, email, or by visiting any closest branch of the same bank Banks’ loss and fraud reporting system will immediately acknowledge your complaint and share a registered complaint number for your reference to keep a track of further developments. 14