Copyright What's New
Preface
Introduction
Bribery and Corruption
Commercial Crime
Computer Fraud
Conducting an Investigation
Data Analytics and Computer Forensics
External Fraud for Personal Gain
Financial Statement Fraud
Fraud Risk Assessment
Identity Theft: Personal and Business
1. What is Identity Theft? 1.1 Definition of Identity Theft 1.2 Common Types of Identity Theft 1.2.1 Personal Identity Theft 1.2.2 Business Identity Theft 2. Laws to Combat Identity Theft 2.1 Proposed Legislation 2.2 The Criminal Code 2.3 Privacy Laws 2.4 Consumer Reporting and Protection Laws 3. Personal Identity Theft 3.1 Overview 3.2 Types of Personal Identity Theft 3.2.1 Financial Identity Theft 3.2.2 Criminal Identity Theft 3.2.3 Cloning Identity Theft 3.3 What to Do As a Victim: Individuals 3.3.1 How to Report Suspected Personal Identity Theft 3.4 Prevention and Detection: Individuals 3.4.1 Wallets and Purses 3.4.2 Social Insurance Number (SIN) Cards 3.4.3 Mail and Garbage 3.4.4 Computers 3.4.4.1 "Phishing" and "Spoofing" 3.4.4.2 Social Networking Sites 3.4.4.3 Anti-virus and Anti-spyware Software 3.4.4.4 Search Yourself on the Internet 3.4.5 Credit and Debit Cards 3.4.6 Telephones and Cell Phones 4. Business Identity Theft 4.1 Introduction 4.1.1 Methods of Committing Business Identity Theft 4.2 Types of Business Identity Theft 4.3 What to Do As a Victim: Businesses 4.3.1 Investigation and Public Relations 4.4 Prevention and Detection: Businesses 4.4.1 Data Management Policies 4.4.1.1 Personal Information Protection and Electronic Documents Act 4.4.2 Network Controls 4.4.2.1 Firewall 4.4.2.2 Webpage Filter 4.4.2.3 Passwords 4.4.2.4 Virtual Private Network (VPN) Access 4.4.2.5 Anti-virus and Anti-spyware 4.4.2.6 Training 4.4.3 Data Security 4.4.3.1 Training and Education 4.4.3.2 Segregation of Duties 4.4.3.3 Access Controls 4.4.4 Records Management 4.4.4.1 Storing Records 4.4.4.2 Disposing of Records 4.4.5 Prevention of Common Schemes to Obtain Business Information 4.4.5.1 Social Engineering 4.4.5.2 Cheque Theft 4.4.5.3 Computers and Laptops 4.4.5.4 Password Guessing 4.4.5.5 Trojans and Keyloggers 4.4.5.6 Business Fraud 4.4.6 Detecting Corporate Identity Theft 5. Identity Theft Checklist Insurance Against Fraud
Internal Fraud
Interviewing Skills
Privacy Rights and the Right to Investigate
Procurement Fraud
Promoting an Ethical Environment
Professional Standards and Pronouncements
Scams and Schemes in the Modern Economy
Fraud Sector-by-sector
Checklists & Other Resources
Glossary User Guide
|