0% found this document useful (0 votes)
334 views1 page

Credit Card Fraud Investigations

This document outlines procedures for investigating several types of credit card and other financial crimes, including account takeover, fraudulently applied cards, counterfeit cards, lost or stolen cards, and manufacturing of fake credit cards. It also provides guidance on investigating vehicle theft and procedures for handling carnapped vehicles. Procedures are presented for investigating cyber sex crimes and computer related crimes, including examples of five types of computer crimes and their investigative aspects.

Uploaded by

Alex Añasco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
334 views1 page

Credit Card Fraud Investigations

This document outlines procedures for investigating several types of credit card and other financial crimes, including account takeover, fraudulently applied cards, counterfeit cards, lost or stolen cards, and manufacturing of fake credit cards. It also provides guidance on investigating vehicle theft and procedures for handling carnapped vehicles. Procedures are presented for investigating cyber sex crimes and computer related crimes, including examples of five types of computer crimes and their investigative aspects.

Uploaded by

Alex Añasco
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

CREDIT CARD FRAUD INVESTIGATIONS (VIOLATION OF RA 8484)

Account Take Over


Steps in Investigating (ATO) Card
Steps in Investigating Fraudulently Applied Card
Filing of the Case (The Documents Needed can be Secured from the Complainant)
Steps in Investigating Counterfeit Cards
Lost/Stolen Credit Card
Steps in Investigating Manufacturing of Credit Cards
CARNAPPING INVESTIGATION
Procedures in handling and investigation of Carnapped vehicles
CYBER SEX CRIMES
Steps in the conduct of cyber sex crimes investigation
COMPUTER RELATED CRIMES
Discuss at least five cases of computer related crimes and its investigative aspects

You might also like