CPS Fraud Support Analyst

Slides:



Advertisements
Similar presentations
An Educational Partnership of Consumer Action and Chase
Advertisements

The Loyalty Card Program
Identity theft Protecting your credit identity. Identity Theft Three hundred forty three million was lost from consumers in 2002 The number of complaints.
JPMorgan Chase Purchasing Card Training
Risk Management Case Study. agenda Firm Overview Case Study – Risk Management Q&A.
Disputes & Fraud………… The Differences PCard Summer School July 30, 2009 Dureen Berg, PCard Coordinator.
Let’s Get Financially Focused! Objectives Students will be able to: 1. Define credit. 2. Explain the negative impact that counterfeiting, forgery, fraud,
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Courtney Hoppe – AVP Relationship Manager Managed Spend (Declining Balance Cards) Payment Plus (Virtual Card Payments)
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
RMG:Red Flags Rule 1 Regal Medical Group Red Flags Rule Identify Theft Training.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
PCard Program Roles and Responsibilities Review Karen Brookbanks, C.P.M., CPPB.
S T R I C T L Y P R I V A T E A N D C O N F I D E N T I A LS T R I C T L Y P R I V A T E A N D C O N F I D E N T I A L © 2008 JPMorgan Chase & Co. All.
Presented By The Plano Police Department Crime Prevention Unit.
Credit Vs. Debit cards. What are Credit Cards? Pre-approved credit which can be used for the purchase of items now and payment of them later.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D 2012 Annual PERT Workshop Best Practice.
1.7.2.G1 Electronic/Online Banking & Bill Pay Take Charge of Your Finances.
Procurement Card Training Strategic Account Management (SAM)
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
CREDIT CARD FRAUDS. Objectives Identify and describe examples of Credit Card frauds. List ways to protect yourself from Credit Card fraud in card present.
Checking Account & Debit Card Simulation Understanding Checking Accounts and Debit Card Transactions.
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
U.S. Bank Payment Analytics Overview. Payment Fraud Trends 2 Reference: Association of Financial Professionals (AFP), 2011 Payments Fraud and Control.
Darren Muise Head of Commercial Partnerships State and Local Government Fraud Awareness and Prevention.
Banking: Checking Account What is a Checking Account? An account where money is deposited and kept for day-to-day expenses Also called demand deposit.
Banking:
EFTPOS and credit Card payments Jana Skriveris Line 4 Due: 14 th Nov Business Admin.
NetService Cardholder Tutorial GE Corporate Payment Services 4246 South Riverboat Road Salt Lake City, Utah Copyright Information.
2015 ANNUAL TRAINING By: Denise Goff
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
JPMorgan Chase Purchasing Card Program Executive Summary.
Credit Cards 101. What are Credit Cards? Pre-approved credit which can be used for the purchase of items now and payment of them later.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
EFTPOS and credit card payments Rachel Garcia Line 4 Due:14 th November Business Admin Michael Barry.
Access Online Cardholder Transaction Approval Training 1 Client Logo.
Business Administration term project 2 (25%) financial Management Systems Debit card and credit card payments By Ashleigh Gray.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Procurement Card Program. This program was established to allow rapid purchases of repetitive or low dollar goods and services while simultaneously reducing.
Checking Account & Debit Card Understanding Checking Accounts and Debit Card Transactions.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Protecting Your Assets By Preventing Identity Theft 1.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
T O S H I B AT O S H I B A Fraud & Disputes – Know Who You Are Trading With.
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
IDENTITY FRAUD Lesson 2-5. A Few Figures on Fraud… 1 in Americans are victims of identity fraud each year. $ Average out of pocket cost to.
Confidential and Proprietary - NOT TO BE DISTRIBUTED WITHOUT THE EXPRESS WRITTEN PERMISSION OF BANK OF AMERICA MERCHANT SERVICES. ASTRA EMV Review/Best.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Fraud Procedures Tips for Mitigation Fraud Case Process.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
UW Whitewater Procurement Card Program
P-Cardholder Training
Fraud Mobility Ken Meiser VP- Identity Solutions.
UGA Extension Credit Card Processing Training
Winnetka Police Department
Red Flags Rule An Introduction County College of Morris
What is BankMobile? A process to select how to receive student refunds and student payroll payments It is fast, secure, and convenient. Go to:
Protecting Your Identity
Protecting Your Credit Identity
Presentation transcript:

CPS Fraud Support Analyst CPS Fraud Overview CPS Fraud Support Analyst

Agenda What is fraud? Fraud Trends Defending Against Fraud Fraud Case Lifecycle Tips to Prevent Fraud 2

Defining Card Fraud What is Fraud? What is not Fraud? Unauthorized transactions by an unknown third party Obtaining services, credit or funds by misrepresentation of identity or information What is not Fraud? Use by a Friend or Family Member “My 16 year old son took the card from my wallet and spent $200 at the mall.” Employee Abuse “A cardholder in my program used their corporate card to pay their utility bill.” Merchant error/disputed transactions “My purchase was $42, but the merchant billed me for $420.” Inability to pay 3

Fraud Trends

Fraud Incident Rate Incidence rates provide strong indication of overall fraud trend The higher the incidence rate, the more fraud we are experiencing Compares fraud cases initiated to active accounts 5

Fraud Activity Fraud Types Counterfeit – Copy of magnetic stripe captured, also know as card present Internet – Card number only, also known as card not present (CNP) Lost/Stolen – Misplaced card or theft NRI – Mail theft, limited risk to corporate/purchasing card portfolios ATO/Fraud App – Identity theft, non-issue for corporate/purchasing card portfolios due to closed-loop issuing process 6

Most Common Fraud MCCs These are only the top 10 most common fraud MCCs Evaluate what merchant groups are necessary for your cardholders Entire merchant groups can be blocked as needed 7

State of Washington Fraud Trends Despite a spike in July, fraud rates have been trending down since January, less than 0.2% in recent months Top fraud MCCs show consistencies with U.S. Bank and the industry 8

Current Fraud Trends Below are the most prevalent trends we are seeing today Counterfeit/Skimming: Card’s magnetic stripe is copied using a track reading and capturing device Merchant Compromise: Interception of magnetic stripe information as it is communicated from merchant to issuer Identity theft: Personal information not belonging to the criminal is used to receive financial services Account number generators: Method of illegally procuring card information facilitated by the internet 9

What are Merchant Compromise Events? Merchant systems are hacked Issuers detect merchant compromise events through pattern analysis on counterfeit cases Card associations are notified of suspected compromises and complete forensic investigations U.S. Bank is notified of confirmed merchant compromises by Visa® and/or MasterCard® 10

Account Number Generators (Creditmaster) A program that generates credit and debit card numbers according to the algorithm used by the major card associations Criminal obtains valid account number and expiration date Programs are only capable of generating account numbers All charges are done over the phone or internet (Card Not Present) This form of fraud is completely independent of any card activity or usage patterns on the part of the cardholders Even cardless accounts can be compromised At any given point, Fraud Management is monitoring many active runs 11

Defending Against Fraud

How U.S. Bank Defends Against Fraud Develop strategies to decline and/or queue suspicious transactions Monitor for counterfeit test authorizations Watch for increased counterfeit activity by location Compare new counterfeit cases against known compromised merchants Assess risk of continued use of compromised card numbers, may suggest a proactive card reissue Analyze transaction history of counterfeit cases daily to find new compromise locations 13

Analyzing Fraud Every morning, the previous day’s fraud cases are reviewed for new fraud trends As the analytics team identifies new trends they adjust or create strategies to detect and stop these trends Rules are monitored and adjusted daily An extensive review of rules is performed monthly to determine areas for improvement and collaborate across U.S. Bank portfolios Two types of fraud rules Near-time rules Real-time rules Combining real-time strategy with near-time strategy provides us with an effective protection against fraud Real-time declines are designed to decline/refer fraud on the first detected attempt Near-time alerts provide an opportunity to block subsequent fraud attempts 14

Near-Time Rules Real-Time Rules Fraud system monitors authorizations post-decision and routes highest risk activity including Authorizations over a risk score threshold Authorizations that meet criteria matching current fraud trends Fraud detection analysts review the accounts in queue Add or remove the Referral Block (FR) Call cardholder to confirm activity, leave block in place if unable to reach cardholder A real-time rule declines or refers at the point of sale Reserved for activity with the highest fraud risk Decline reason is ‘ADS I Strategy/0871 ADS II FILTER’ which stands for Authorization Decision Strategy Real-Time Rules 15

Fraud Case Lifecycle

What Happens if Fraud is Confirmed? Fraud claim is initiated Card will be closed as a result of claim initiation Notations added to the account memo Case submitted in fraud system Any follow-up questions are directed to FDSS (Fraud and Disputes Solution Services team) 17

Fraud Case Process Fraud cases should be initiated over the phone. Please do not use mail, fax or online processes to initiate fraud Contact Cardmember Service at 800-344-5696 (Corporate) The Service Advisor transfers the customer to our fraud department (800-523-9078) where they will review the current activity with the cardholder The Fraud Representative will initiate the case by marking the authorizations and/or transactions that have posted to the account that are believed to be fraudulent Because a third party has gained access to your account information we will ask you to close your account as we are required to do so. It will be replaced with a new number and all account information transferred The case appears in a case processing queue the day following initiation Changes to the fraud card are processed including credit rating, address, company number and agent number Case Processor is assigned to monitor the account to see if charges have posted If the fraud charges post to your new account you will receive a credit to your account and sent a statement of fraud to confirm that you did not authorize those transactions 18

Fraud Case Process Cont’d The statement of fraud form will be generated based on the posted fraud transactions and mailed within 3 weeks of case initiation. If the case is started on authorization activity and the transactions never post, no statement of fraud will be created and the case will be closed The statement of fraud will be mailed to the system address on the card. If there is a request to fax or mail to an alternate address please call the Fraud Department to request these changes The statement of fraud will need to be completed by the cardholder and returned to the Fraud Department by the due date on the form Once the statement of fraud is received an investigation will be conducted to determine who is responsible for the fraud If it is discovered that the cardholder participated or benefited from the charges the account will be re-billed and the claim denied If the claim is resolved in the cardholder’s favor the credit will remain on the account permanently If the signed statement of fraud is not received by the bank, the new account will have the charges reapplied and the cardholder will be liable to pay for them 19

Tips to Prevent Fraud

Program Administrator Tips Review spending reports and question non-business related transactions Suspend or cancel charging privileges when appropriate Be mindful of how card data is stored and destroyed Keep cardholder account records current Ensure that termination includes destroying the card and closing the account Notify Account Coordinator of anticipated changes in spending patterns Frequently communicate policies on appropriate use of the card and how to report suspicious activity Schedule fraud reports to monitor activity and ensure the statement of fraud affidavit is returned to the bank. They can be scheduled to go to your Access Online Data Exchange mailbox Statement of Fraud Report includes all fraud cases that were opened in the past 90 days and show when the document was sent and if/when it was received back by U.S. Bank Fraud Summary Report includes all authorizations and transactions identified as fraud for each fraud case during the time frame requested. The report also summarizes the top fraud MCCs by count and dollar amount 21

Cardholder Tips Sign your cards as soon as they arrive Don’t lend your card or personal identification number (PIN) to anyone Don’t leave cards or receipts lying around Keep an eye on your card during the transaction and get it back as quickly as possible Destroy receipts and statements you no longer need Reconcile accounts frequently Report any questionable charges promptly to U.S. Bank Notify card companies in advance of a change in address or phone number Don’t write your account number or personal information down Don’t give out personal information over the phone unless you initiated the call and the company is reputable Keep a record of your account numbers, their expiration dates, and the phone number and address of each issuer in a secure place 22