Fraud Overview Presented by: Ian Moore, Fraud Analyst May 20, 2008.

Slides:



Advertisements
Similar presentations
Consumer Refund Process Training July, 2009 Proprietary/Confidential. For Internal or Acronis Authorized Partner Use Only.
Advertisements

Use of FuelTrac Card for Purchases of Gas for University Vehicles FuelTrac can ONLY be used in State owned Vehicles or those leased through the State Enterprise.
Compliance with Federal Trade Commission’s “Red Flag Rule”
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Federal Acquisition Service U.S. General Services Administration Welcome to: GSA Fleet Program Overview Jenna Crowson GSA Fleet.
Red Flags 101. What It’s All About Section’s 114 and 315 of the FACT Act were implemented in October 2007 and became effective January 1, These.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Red Flags Rule & Municipal Utilities
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
GOVJOBS.com U.S. Government Job Bank The Leading Provider of Electronic Job Banking Solutions for Government Personnel and Staffing Departments Since 1998.
Operated by Los Alamos National Security, LLC for the U.S. Department of Energy’s NNSA U N C L A S S I F I E D 2012 Annual PERT Workshop Best Practice.
2012 Trends in Inventory Auditing WIS Customer Forum Oct 2012 KPMG LLP.
1 CSI COMPLIANCE AWARENESS TRAINING ANTI MONEY LAUNDERING July 2004 This is confidential proprietary and trade secret information of American Express Travel.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
U.S. Bank Payment Analytics Overview. Payment Fraud Trends 2 Reference: Association of Financial Professionals (AFP), 2011 Payments Fraud and Control.
Cost Control Measures for Food Service Operations
Network security policy: best practices
IBE Barter 101 Webinar Welcome to IBE Barter Exchange.
Corporate Purchasing Card Enhanced Reporting January 2015 Web Version 1.
May 19, 2010 Statewide Fuel Card Standards & Guidelines An Overview of Statewide Fuel Card Policies Released March 1, 2010 State of Georgia Department.
Detecting, Preventing, and Mitigating Identity Theft
HAVE A DRINK ON US! Jamie Customer 1234 Curvy Paved Rd. Apt. 100 Jacksonville, FL TAKE A PEEK. EARN A DRINK.
Student Affairs Buying 101 Procurement Methods Students First Topic
Go further… Oahu Petroleum Fleet Services Card. © 2005 Wright Express Corporation. All Rights Reserved.2 Fuel Dollars per month: Full Size Vans Dollars.
PLYMOUTH STATE UNIVERSITY Purchasing Card Program Department Card Training Revised February 2012.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Islamic University of Gaza
Segregation of Duties– Sponsored Programs APM
OneView Benefits Sales collaboration across network A “one-stop” utility portal Ease of use, scalability & accessibility Useful reports and metrics Improved.
3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge America,
PLYMOUTH STATE UNIVERSITY Purchasing Card Program Cardholder Training Updated February 2012.
2014 Reliance Manufacturers Rep Meeting AGENDA: Customer Relations Overview Manufacturers Rep Expectations Overview Quarterly Review Discussion Commission.
Presented to President’s Cabinet. INTERNAL CONTROLS are the integration of the activities, plans, attitudes, policies and efforts of the people of an.
® Working With Citi Sabrina Dyer Vice President. ® 2 To ensure the best possible learning experience for participants, please adhere to the following.
Rev Network This document contains Network’s confidential proprietary information and as such recipient agrees not to duplicate, decompile, disassemble,
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
Introduction Presented By: Natasha Hammack. Network Overview Randall Publishing Co. has developed an online truck driver recruiting network in association.
For Real Estate Agents Farming Equipment Heavy Equipment Real Estate Motor Vehicles.
Hawk card (ID) Higher One card Hawk Card Vs. HigherOne card.
ZHRC/HTI Financial Management Training Session 9: Stores and Supplies Management.
Student Accounting Department Card Training Revised February 2012.
Available from BankersOnline.com/tools 1 FACT ACT RED FLAG GUIDELINES.
Red Flag Training IDENTITY THEFT PREVENTION PROGRAM OVERVIEW AUTOMOTIVE.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
New Identity Theft Rules Rodney J. Petersen, J.D. Government Relations Officer Security Task Force Coordinator EDUCAUSE.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Chapter 9: Introduction to Internal Control Systems
ISO/IEC 27001:2013 Annex A.8 Asset management
You. are at risk for the fastest growing crimes crime.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
1 Banking and Reconciliation. 2 To Certify As A Cash Handler  Visit the training website  Review the Payment Card Industry (PCI)
Introduction With the development of the Internet a phenomenon known as 'electronic commerce' or 'ecommerce' for short, has been growing. Ecommerce has.
Purchasing Cards. What is a Purchasing Card? It is a type of commercial credit card, used by organizations for payment of goods and services. This tool.
Using Bank Services Chapter 33. Checking Accounts A customer deposits money in an account and receives a book of checks. May deposit or withdraw money.
Who’s A Control Freak? Audrey Flood November 2006 State of Texas User Conference.
Wire Fraud Prevention Training: Setting Your Organizational Structure to Mitigate Fraud Risk and Comply with Regulatory Expectations Presented by: Terri.
Sinclair Over The Road Fuel Card
Gift Card Risk Mitigation – Presentation A
Inventory Transactions庫存交易
Own Your Identity.
UGA Extension Credit Card Processing Training
Red Flags Rule An Introduction County College of Morris
Own Your Identity.
Identity Theft Prevention Program Training
Clemson University Red Flags Rule Training
Operations Management
Presentation transcript:

Fraud Overview Presented by: Ian Moore, Fraud Analyst May 20, 2008

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 2 Objective The primary objective of the Fraud group is to reduce financial risk resulting from fraud activities to our customers, our partners, and Wright Express. This is accomplished through prevention, detection, and management of abuse and fraud activities.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 3 Overview Prevention: Training and education are mission critical. Provide consulting on card security best practices, front line defense tactics, and the red flags of fraud. The customer Customer service representatives Credit analysts Activation associates Account managers Sales representatives

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 4 Overview Cont’d Detection: Transaction or velocity monitoring is mission critical. High volume activity High dollar transactions High crime areas Activity at “hot spot” merchants Excessive pay-at-the-pump activity New account activity

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 5 Overview Cont’d Case Management: Servicing the customer and appropriately assessing liability are mission critical. Risk mitigation Customer communication Analysis of case components Legal consideration and interpretation of facts Tracking database Reporting

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 6 Leveraging Strengths Team of Fraud professionals Portfolio-specific assignments Experience and expertise Customer focus Extensive network of industry contacts Industry association memberships

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 7 The Team

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 8 Fraud Trends 2008 Record high, volatile PPG makes fleet card programs a target of both criminal enterprises and opportunists alike Fleet drivers, who may be struggling to personally absorb high PPG, more likely to misuse or abuse card privileges Average vehicle owner more likely to accept a “deal” from someone selling gas at a discounted rate Fuel-related thefts and fraud receiving national attention Application fraud on the rise – higher commercial credit lines (versus consumer) more lucrative and appealing to perpetrators. Websites providing instruction on how to perpetrate commercial loan fraud

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 9 Fraud Trends 2008 Cont’d. Increasingly, retail fueling locations carry items such as electronics and department store gift cards, cell phones, etc. which are attractive to fraudsters More opportunity to turn fuel card into cash Opportunists are striking harder than ever, e.g. collusion and merchant abuse

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 10 Partnership Wright Express’ Fraud Department makes every effort to detect unusual or excessive purchase activity using constantly evolving techniques. However, we are not positioned to be able to detect all misuse, abuse, or violations of your internal policies. Our efforts used in tandem with your internal controls and use of our exception reporting, authorization controls, and online products can substantial reduce exposure to abuse and fraud, and any associated losses.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 11 Prevention Techniques One critical key to preventing misuse is establishing top-down accountability. Make sure those responsible for administration are ordering and maintaining an inventory of cards accurately by performing periodic audits Each driver should be assigned a unique Driver Identification Number (DIN) that is to be kept strictly confidential Avoid the use of a “spare” or generically assigned DIN to remove the cover of anonymity

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 12 Prevention Techniques Cont’d. Establishing DINs Assign one DIN per driver Assign random DINs as opposed to social security numbers or employee numbers Assign six-digit DINs as opposed to four-digit DINs Avoid easily guessed DINs, such as “1111” or “1234”

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 13 Prevention Techniques Cont’d. Keep DINs Secure Require drivers to memorize their DINs; DO NOT keep cards and DINs together or write the DIN on the card Drivers should avoid giving a DIN to a station attendant and should insist on entering the number without the help of the attendant Drivers should not use the DIN or any variation of the DIN as the odometer entry

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 14 Prevention Techniques Cont’d. Immediately report driver and/or vehicle changes If a vehicle is transferred, sold, or retired, immediately cancel the appropriate card If a driver leaves or is dismissed, be sure to: Cancel his or her DIN immediately Retrieve his or her card Verify that all other cards are in their appropriate locations

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 15 Prevention Techniques Cont’d. How can WEX help prevent misuse of the program? Authorization Controls Purchase Alerts Real-time Authorization Data Customized Exception Reporting

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 16 Prevention Techniques Cont’d. Purchase Alerts Purchase Alerts are simply the fastest way to put a stop to any misuse or abuse of your card program. Keep a close watch on your purchases — both fuel and service (where applicable) — and quickly address any unauthorized purchases. Utilize Purchase Alerts to start receiving an notification when a card has violated one of the purchase guidelines you set on your account. Using WEXOnline®, specify purchase guideline parameters at the account level, or go further and put specific guidelines on individual cards. When you receive an alert, simply log in, review the details and decide what action to take.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 17 Prevention Techniques Cont’d. Purchase Alerts cont’d Specify what transactions you want to be alerted to: Multiple Transactions per Day Out-of-State Transactions Off-Hours Transactions Day of the Week Dollars per Day Dollars per Transaction Gallons per Transaction Fuel Type

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 18 Prevention Techniques Cont’d.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 19 Prevention Techniques Cont’d. Authorization Controls With more than 99.8% of Wright Express card transactions at fuel merchants processed electronically, control over these purchases is directly in your hands. Using the Profile Manager in WEXOnline® you can help prevent unauthorized purchases by setting rules for how much your drivers buy, how often and when. If a transaction exceeds any of your limits, our system is designed to decline the transaction, subject to the limitations described in Profile Manager.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 20 Prevention Techniques Cont’d. Authorization Controls cont’d We offer five different types of limits: Daily Dollar Limit* Daily Number of Transactions (per card, per day) Transaction Dollar Limit* Day of Week Time of Day * Some restrictions apply.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 21 Prevention Techniques Cont’d. Exception Reports Many fleet managers find that the Exception Report is their most valuable tool in the monthly report package. Here is where you’ll find any irregularities, possible misuse, or abuse. For example, if your fleet’s vehicles only travel between the hours of 7 a.m. to 6 p.m., you would want to investigate a transaction that occurred at 10 p.m. Exception reporting is available on demand using WEXOnline. You can run queries to look for irregularities with transactions as they post to your account. Information is available for the current month, plus the previous twelve months so you can easily look for purchasing patterns or trends across time.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 22 Prevention Techniques Cont’d.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 23 Prevention Techniques Cont’d. Exception Reports cont’d We set up your account with default limits on your Exception Report: Cost per fuel transaction - $70 / transaction Fuel types – regular unleaded (including alcohol blends) Number of fuel transactions per day – limit one transaction Monthly gallons per vehicle – 150 gallons/vehicle/month You can change these limits at any time, as well as add others from a comprehensive list.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 24 Prevention Techniques Cont’d.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 25 Prevention Techniques Cont’d. Authorization Activity Wright Express has added the availability of real-time authorization data on WEXOnline®. Powerful querying tools allow you to view: Up to four calendar days worth of authorization requests Fuel or service merchant authorization requests Approved or declined transactions

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 26 Prevention Techniques Cont’d.

© 2008 Wright Express. All Rights Reserved. Proprietary and confidential. 27 Prevention Techniques Cont’d.