contact us  |  print  |  français  |  log in
my downloads
pay an invoice
my account
Accounting & assurance
Business & finance
CPA Canada Handbook
Information technology
Practice management
Risk & governance
Tax
Other
in all formats

CPAstore - Accountant's Handbook of Fraud Prevention and Detection (FRAUD), The

Copyright

What's New

Preface

Introduction

Bribery and Corruption

Commercial Crime

Computer Fraud

Conducting an Investigation

Data Analytics and Computer Forensics

External Fraud for Personal Gain

Financial Statement Fraud

Fraud Risk Assessment

Identity Theft: Personal and Business

1. What is Identity Theft?

1.1 Definition of Identity Theft

1.2 Common Types of Identity Theft

1.2.1 Personal Identity Theft

1.2.2 Business Identity Theft

2. Laws to Combat Identity Theft

2.1 Proposed Legislation

2.2 The Criminal Code

2.3 Privacy Laws

2.4 Consumer Reporting and Protection Laws

3. Personal Identity Theft

3.1 Overview

3.2 Types of Personal Identity Theft

3.2.1 Financial Identity Theft

3.2.2 Criminal Identity Theft

3.2.3 Cloning Identity Theft

3.3 What to Do As a Victim: Individuals

3.3.1 How to Report Suspected Personal Identity Theft

3.4 Prevention and Detection: Individuals

3.4.1 Wallets and Purses

3.4.2 Social Insurance Number (SIN) Cards

3.4.3 Mail and Garbage

3.4.4 Computers

3.4.4.1 "Phishing" and "Spoofing"

3.4.4.2 Social Networking Sites

3.4.4.3 Anti-virus and Anti-spyware Software

3.4.4.4 Search Yourself on the Internet

3.4.5 Credit and Debit Cards

3.4.6 Telephones and Cell Phones

4. Business Identity Theft

4.1 Introduction

4.1.1 Methods of Committing Business Identity Theft

4.2 Types of Business Identity Theft

4.3 What to Do As a Victim: Businesses

4.3.1 Investigation and Public Relations

4.4 Prevention and Detection: Businesses

4.4.1 Data Management Policies

4.4.1.1 Personal Information Protection and Electronic Documents Act

4.4.2 Network Controls

4.4.2.1 Firewall

4.4.2.2 Webpage Filter

4.4.2.3 Passwords

4.4.2.4 Virtual Private Network (VPN) Access

4.4.2.5 Anti-virus and Anti-spyware

4.4.2.6 Training

4.4.3 Data Security

4.4.3.1 Training and Education

4.4.3.2 Segregation of Duties

4.4.3.3 Access Controls

4.4.4 Records Management

4.4.4.1 Storing Records

4.4.4.2 Disposing of Records

4.4.5 Prevention of Common Schemes to Obtain Business Information

4.4.5.1 Social Engineering

4.4.5.2 Cheque Theft

4.4.5.3 Computers and Laptops

4.4.5.4 Password Guessing

4.4.5.5 Trojans and Keyloggers

4.4.5.6 Business Fraud

4.4.6 Detecting Corporate Identity Theft

5. Identity Theft Checklist

Insurance Against Fraud

Internal Fraud

Interviewing Skills

Privacy Rights and the Right to Investigate

Procurement Fraud

Promoting an Ethical Environment

Professional Standards and Pronouncements

Scams and Schemes in the Modern Economy

Fraud Sector-by-sector

Checklists & Other Resources

Glossary

User Guide


Terms and Conditions | Privacy Policy | Shipping and Store Policies | AODA | Anti-Harassment Policy | Advocacy | Vulnerability Disclosure

Help Desk: Mon-Fri, 9am-5pm ET | 1-866-256-6842 | Contact us

© 2001-2024, CPA Canada | EYEP. All rights reserved.