Computer fraud

Results: 842



#Item
441Risk / Information technology audit / Deception / Audit / Insurance fraud / Fraud / Information technology audit process / Computer-aided audit tools / Crimes / Auditing / Ethics

SIU Compliance Solutions, Inc. What you need to know about Anti-Fraud Audits By Jack Scott, Anti-Fraud Consultant State Insurance Regulators are increasing the amount of Anti-Fraud audits in order to insure carrier accou

Add to Reading List

Source URL: www.fraudeducation.com

Language: English - Date: 2012-07-02 16:06:22
442Internet / Credit card / Computer virus / Internet privacy / Internet fraud / Digital media / Email / Technology

Microsoft PowerPoint - SPInternetSafetyupdated.ppt

Add to Reading List

Source URL: www.ddssafety.net

Language: English - Date: 2014-11-11 10:13:20
443Business telephone system / Computer telephony integration / Phreaking / Voice-mail / Hacker / Password / Extension / Toll-free telephone number / Virtual PBX / Telephony / Computing / Electronics

PBX Fraud Information Increasingly, hackers are gaining access to corporate phone and/or voice mail systems. These individuals place long distance and international calls through major telecom networks using local system

Add to Reading List

Source URL: www.tdsbusiness.com

Language: English - Date: 2013-01-09 09:43:18
444Business / Fraud / Information technology audit / Audit Commission / Department for Communities and Local Government / Audit committee / Internal audit / Computer-aided audit tools / National Audit Office / Accountancy / Risk / Auditing

The National Fraud Initiative in Scotland Prepared by Audit Scotland June 2014 Audit Scotland is a statutory body set up in April 2000 under the Public Finance and Accountability (Scotland) Act[removed]We help the Auditor

Add to Reading List

Source URL: www.audit-scotland.gov.uk

Language: English - Date: 2014-06-26 03:14:36
445Security / Classified information in the United States / Internet / Email / Single Scope Background Investigation / Password / Security clearance / Internet privacy / National security / Espionage / United States government secrecy

SYSTEM AUTHORIZATION ACCESS REQUEST (SAAR) PRIVACY ACT STATEMENT AUTHORITY: Executive Order 10450, 9397; and Public Law[removed], the Computer Fraud and Abuse Act. PRINCIPAL PURPOSE: To record names, signatures, and other

Add to Reading List

Source URL: www.uscg.mil

Language: English - Date: 2012-03-29 09:56:37
446Computer crimes / Identity / Identity theft / Theft / Fraud / Credit card fraud / Phishing / Bank fraud / Personally identifiable information / Crimes / Ethics / Criminal law

Report on Electronic Commerce-Based Crimes Prepared by the Hawaii Anti-Phishing Task Force Pursuant to Act 65, Session Laws of Hawaii 2005

Add to Reading List

Source URL: ag.hawaii.gov

Language: English - Date: 2013-01-31 21:59:10
447Malware / Computer crimes / Computer network security / Identity theft / Rootkit / Man-in-the-browser / Smartphone / Spyware / ReD / System software / Computing / Cyberwarfare

W H I T E PA P E R Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you’re in the e-commerce business – you probably have a baseline level of fraud losses due to stolen credit

Add to Reading List

Source URL: www.pymnts.com

Language: English - Date: 2014-01-13 12:33:24
448Hacking / Information technology audit / CFAA / Law / Computing / 98th United States Congress / Computer Fraud and Abuse Act / Computer law

Snell & Wilmer L.L.P. UNDER CONSTRUCTION WORD The Workplace

Add to Reading List

Source URL: www.swlaw.com

Language: English - Date: 2011-05-23 18:41:02
449Computer crimes / International Association of Prosecutors / Prosecution / Identity / Identity theft / Financial crimes / Fraud / Organized crime / Law / Crimes / Criminal law

Global Prosecutors E-Crime Network Newsletter Issue 11 August 2014 Welcome to the August 2014 edition of the GPEN newsletter. This month’s GPEN Greatest Influencer interview is with Dr Cheol-Kyu Hwang the Deputy Minist

Add to Reading List

Source URL: www.iap-association.org

Language: English - Date: 2014-08-21 05:37:45
450National security / Cyberwarfare / Government / Central Intelligence Agency / International Multilateral Partnership Against Cyber Threats / Secretaría de Inteligencia / Computer security / KPMG tax shelter fraud / Security / Computer crimes / KPMG

Cyber threat intelligence and the lessons from law enforcement

Add to Reading List

Source URL: www.kpmg.com

Language: English
UPDATE