ABUSE OF THE STUDENT ROUTES Martin Vernon. 2 ABUSE OF STUDENT ROUTES THE MAIN THREATS Threats AffiliationsForgeryCorruptionAgentsExploitation.

Slides:



Advertisements
Similar presentations
What Are Scams? Scams are designed to trick you into giving away your money or your personal details. Scams come to you in many forms – by mail, ,
Advertisements

Administration Intermediate 1 & 2 Command Words Identify 2 pieces of information included in the contract of Employment, apart from employees personal.
Using Information at the University University Secretarys Office
Raising Achievement. 2 Aims To explore approaches and materials to support the planning of learning. To consider strategies for preparing learners for.
An Electronic Provider Reimbursement Solution 12/01/2010Confidential-All Rights Reserved-
What is True Love? Thats an age old philosophical question… But for the purposes of this presentation, True Love? is a campaign aimed at raising awareness.
IV. Breach of Contract Headings: Remedies Damages Recoverable loss
Program design overview Pre-contract to post-program year Office on Volunteerism and Community Service.
Managing Money. Copyright © Houghton Mifflin Company. All rights reserved.Managing money - 2 Managing Money: The Source of Money Problems Most money problems.
Money and Financial Institutions. In the monetary system goods and services are indirectly exchanged using money, which can then be exchanged for other.
1 2 Note: The following slides represent suggestions to enhance the writing of a SAR narrative. This information should be used in conjunction with the.
Help me - I’m a Headteacher. Why schools need support Why schools need support Schools are keen to establish links with local community organisations.
SCIENCE. Science For current grade 9 students Grade 10 Science (Apply or Academic) is a mandatory course Taking multiple science courses in a year is.
Introduction to organisational needs analysis Welcome Your facilitator is Please check your audio go to Tools > Audio > Audio Setup Wizard (in the menu.
1 Preventing Financial Exploitation of Adults How Adult Protective Services and Financial Institutions Can Work Together.
Training Presentation E-Learning Test Request. Objective Provide Test Center staff members with information about the e-learning test request process.
1.7.6.G1 © Family Economics & Financial Education –March 2008 – Financial Institutions – Online Banking – Slide 1 Funded by a grant from Take Charge America,
Money and Financial Institutions
Ajay K. Merchant. Being rich is not about having money but everything other than money. Rich relationships lead to much more than money. They lead to.
Banking Elder Abuse and Exploitation. Consider the following when determining whether an older adult may be in jeopardy: Is there more than one person.
© 2008 Brigham Young University–Idaho. Teacher Certification for the State of Idaho 1.Why should I certify in the State of Idaho? Reciprocal agreements.
Student Business Services Texas Tech University Health Sciences Center.
B2B Egypt B2B MARKETING Types Social Network Marketing Full Marketing Paln Google Advertising Marketing by s Marketing Ad. On search engine.
This project is funded with support from the European Commission " Legal disclaimer: the contents of this material is the sole responsibility of implementing.
Travel and Training Information SEPTEMBER PURCHASING DEPARTMENT.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Non U.S. Resident Taxes (NRA) University of Washington Student Fiscal Services.
Managing your client risks in difficult times Peter Scott PETER SCOTT CONSULTING.
30 minutes could save you thousands FINANCIAL AID.
Part One: APPLICATION FOR EMPLOYMENT- CLASSIFIED SERVICES How to Complete and Submit a Torrance Unified School District Application Form.
Office of Risk Management Annual Conference Emergency Procurements Tammy Grant, CPPB State Purchasing Assistant Director
Part One: APPLICATION FOR EMPLOYMENT- CLASSIFIED SERVICES Click here to start the presentation.
Workplace Violence Research has identified factors that may increase the risk of violence at worksites. Such factors include working with the public or.
Employing International Students: Tier 4 without the tears Sally Saca International Student Advisory Service.
At LCC we want you be academically successful and this usually means doing well in the classroom. In this section we will cover some basic college “know.
STUDENT FEDERAL WORK-STUDY ORIENTATION.
Talent Development Programme 2013 Employee Programmes.
Webinar: Fresno State Foster Youth Information for High School Counselors.
Approval by Board and Completing the Application Packet.
Student Resume Writing And Federal Job Opportunities.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Very Important Documents O I-20 Form O Passport Please do not lose any of these documents. They can be hard to replace and can be costly.
N ew B eginning Z Full Volunteer Application 2012 Please attach to your submission the following documents: 1.Full Colour Copy of I.D & or Passport & or.
2010 Test Security 2011 Campus Test Coordinator Training Test Security January 26, 2011 Freeport Intermediate school.
Maintain and develop relationships and partnerships Generating Leads – Through the AIL Program The Role of Public Relations.
SECURITY – A CORE BUSINESS ACTIVITY Supply Chain Awareness Pass Application and Vetting Process.
Travel and Training Information SEPTEMBER PURCHASING DEPARTMENT.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Level 1 Award in Business Administration Copy Right ©
Procurement Made Easy! Thursday 8 th March 2012 Tony McElholm Programme Officer Special EU Programmes Body.
Completing a Job Application
TRAINING COURSE. Course Objectives 1.Know how to handle a suspected case 2.Know how to care for a recognized trafficked person referred to you Session.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Office of Student Financial Assistance University of Alaska Anchorage work-study.cfm.
Money Management Sebastian Hesse. Opening a Bank Account You need to have a bank account. Its easy, selecting the bank you want to work with, call to.
Do you know who you’re dealing with? Social Engineering: Minimise the risk of becoming a victim.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Welcome on behalf of the Higher Education Academy Jane Priestley Academic Lead Health Care.
Avoiding Unauthorized Purchases An unauthorized purchase is a purchase committing agency funds without prior approval. Training provided by Texas Juvenile.
Tier 4 Compliance Visits Experiences and Requirements Jon Pink Academic Registrar, University of Kent.
Chelsea’s Choice - So What is Child Sexual Exploitation? (CSE) AnyName School Year 8 Tutor Time.
Sexual Exploitation, Consent and the Law AnyName School Year 10 Tutor Time.
How Immigration Professional Agents for Denmark Can Help ? Immigration agents for Denmark.
AIR FORCE COMMISSIONING PROGRAM
שילוב קורסים לפיתוח מיומנויות למידה במכללה להנדסה
Optional Practical Training
“Harnett County is a place where I feel I have always been more than a number! We are a small district with big values. Work here, and become a part.
Policy Frameworks: building a firm foundation for your IR
Presentation transcript:

ABUSE OF THE STUDENT ROUTES Martin Vernon

2 ABUSE OF STUDENT ROUTES THE MAIN THREATS Threats AffiliationsForgeryCorruptionAgentsExploitation

3 ABUSE OF STUDENT ROUTES FALSE AFFILIATIONS Disreputable organisations may claim affiliations with well known institutions Claims They may put college logos on their letterheads or websites Logos Certificates taken but awarded by a different institution may be claimed as affiliation Exaggeration

4 ABUSE OF STUDENT ROUTES FALSE AFFILIATIONS Clarity on websites Claims Vigilance Logos Making rules clear Exaggeration

5 ABUSE OF STUDENT ROUTES FORGERY & COUNTERFEITING ‘Blanks’ and security paper have currency Valuable materials Genuinely issued documents may be altered Forgeries Simple or printed designs are easily copied Counterfeits

6 ABUSE OF STUDENT ROUTES FORGERY & COUNTERFEITING Control Valuable materials Security Counterfeits Forgeries

7 ABUSE OF STUDENT ROUTES PARTNERSHIPS WITH AGENTS & OTHERS Approach with offer to find students, organise tests or visa clearance Contact May suggest partnering or delivering specific skills courses off-campus Courses Students actually selected on will to pay rather than on ability or testing Selection

8 CRIMINAL ABUSE OF STUDENT ROUTES PARTNERSHIPS WITH AGENTS & COLLEGES Vetting Contact Risk management Courses Checking and monitoring Selection

9 ABUSE OF STUDENT ROUTES STAFF CORRUPTION Personal gain Blackmail, threats or coercion Naivety Motivation Administration staff Academic staff Security, contract or cleaning staff Personnel with access Use of PO boxes/ addresses Business cards Illusion of authority

10 ABUSE OF STUDENT ROUTES STAFF CORRUPTION Insight Motivation Vetting Personnel with access Controlled access Illusion of authority

11 ABUSE OF STUDENT ROUTES EXPLOITATION Even migrants who are aware that they are not genuine students can become victims Victims Many students will have paid large sums of money to unscrupulous agents Scams They can be controlled by threats, blackmail or violence Exploitation

12 ABUSE OF STUDENT ROUTES EXPLOITATION Pastoral care Victims Reporting Scams Vigilance Exploitation

13 If you suspect :tell us. ABUSE OF STUDENT ROUTES