Introduction

Document Forging

Any corporation or individual that issues checks or other valuable documents is a possible target for document fraud. An organization cannot be too small, or too large, to be a victim. In fact, many small- to medium-size businesses are prime targets. However, one thing is certain no matter what size the company; fraud represents both a financial loss and an affront to the victim. Because recovery of losses are rare, prevention is generally seen as the only viable course of action.

What Are Valuable Documents?

Valuable documents can be any document that has monetary worth and could be targeted for fraud. While it is obvious negotiable documents such as checks and gift certificates need protection, some official and original documents need protection from fraud as well. Consider the following:

Official Documents

  • Certificates (Birth, Death, Title, Ownership, etc.)
  • Transcripts & Diplomas
  • Identification & Membership Cards
  • ISO (and other certification) Documents
  • Permits and Licenses (hunting, fishing, building, driving, etc.)
  • Vehicle Registrations

Original Documents

  • Admission & Event Tickets
  • Certificate of Authenticity
  • Labels and Packaging (proof of purchase, tamper-indicating seals, etc.)
  • Licenses (software, business, etc.)
  • Merchandise Tags
  • Point of Sale Receipts
  • Prescription Forms*
  • Proof of Insurance

Negotiable Documents

  • Airline Tickets, Bus Transfers & Boarding Passes
  • Checks (accounts payable, payroll, medical reimbursement, expense, dividend, etc.)
  • Coupons
  • Credit Refund Forms
  • Gift Certificates
  • Hotel Vouchers
  • Money Orders & Travellers Checks
  • Rebate Coupons

Terms & Condition of
International Cyber Security

International Cyber Security Private Limited, company incorporated under the laws of Sri Lanka and having its registered office at Address and Service provider International Cyber Security (Pvt) Limited, PV 118434 at Colombo Sri Lanka a company incorporated under the laws of Sri Lanka and having its registered office Address P.O Box 2200 Colombo,

The parties above named are hereinafter collectively referred to as “Parties” and individually as “a Party”

PURPOSE

(CLIENT) is interested in engaging the services of Service provider for the purpose of creating websites for the organization. In order to enable (CLIENT) to associate with Service provider, (CLIENT), at its sole discretion, will from time to time disclose to Service provider information that is considered confidential to (CLIENT). (CLIENT) is willing to do so provided that Service provider observes certain requirements to assure that such information is kept confidential and not used in any way, except as expressly authorized herein

DESCRIPTION OF (CLIENT) CONFIDENTIAL INFORMATION

“(CLIENT) Confidential Information” shall mean all information disclosed to Service provider by (CLIENT) that is disclosed either directly or indirectly, orally, in writing or by inspection of equipment, materials or processes used by (CLIENT). All data generated by Service provider during the course of the research of (CLIENT)’s and that of its associates shall be considered (CLIENT)’s Confidential Information. (CLIENT)’s Confidential Information shall also mean information that is proprietary or confidential to a third party, including any related company of (CLIENT). (CLIENT)’s Confidential Information shall further include (i) all analyses, compilations, forecasts, studies, summaries, notes, data and other documents and materials in whatever form maintained, whether prepared by (CLIENT) or its Representatives or others, that contain or reflect, or are generated from any of the data or information referred to in the immediately preceding sentence (collectively , “Derivative Data”) and (ii) the fact that the parties are working on the intend project and the fact that the parties are making Confidential Information available to each other.

DESCRIPTION OF SERVICE PROVIDER’S CONFIDENTIAL INFORMATION

Any secret official code word or password, sketch, plan, model, article, note, document (including its part thereof), drawing, layout, blue-prints, intellectual property rights, materials relating to the machinery, equipment, processes and products invented or used by a party, technical and non-technical information (including its part thereof), trade secrets and other confidential information which is or has been in the possession of Service provider which Service provider provide to (CLIENT).

(CLIENT)’s Confidential Information and Service provider Confidential Information shall be collectively

referred to as “Confidential Information”
Confidential Information shall not include the following:
- Information which at the time of disclosure is in the public domain; or
- Information which, after disclosure, becomes a part of the public domain by publication or otherwise, except in breach of this Confidentiality Agreement; or
- Information which the Recipient can establish was in its possession prior to disclosure or was subsequently and independently developed by employees of or behalf of Recipient without use, direct or indirect, or information required to be held confidential hereunder, and who had no knowledge of the information disclosed; or
- Information that the Recipient shall receive from a third party, provided however that the third party has the right to disclose the information to the Recipient; or Information which is required by law to be disclosed, provided that the Disclosing Party shall give the Recipient written notice thereof and adequate opportunity, if practicable, to contact a government entity to object to any disclosure or to request confidential treatment thereof.

LIMITED DISCLOSURE

Parties agree to limit dissemination of Confidential Information only to those of its employees having a need-to-know and who have been advised of the obligations and restrictions assumed hereunder, and the recipient party shall cause all such persons to comply with the terms herein.

NO RIGHT OR CLAIM TO CONFIDENTIAL INFORMATION BY BOTH PARTIES

Parties acknowledges that the Confidential Information is the confidential and proprietary information and property of the disclosing party and that the recipient party does not have any claim, right, title, property or other interest or license of any kind or nature in the Confidential Information. Parties shall hold and maintain the Confidential Information in strict confidence and in trust for the sole and exclusive benefit of the disclosing.

RETURN OF CONFIDENTIAL INFORMATION

Upon written request by the disclosing party, the recipient party or upon completion of any assignment given to Service provider, the recipient shall promptly return to the disclosing party any and all confidential materials containing Confidential Information, and destroy materials derived from the recipients’ access to Confidential Information together with all reproductions thereof in any form which the recipient may have in its possession or control.

INJUNCTIVE RELIEF

The Recipient understands and acknowledges that any disclosure or misappropriation of any of the Confidential Information in violation of this Agreement may cause the disclosing party irreparable harm, the amount of which may be difficult to ascertain and, therefore, agrees that the disclosing party shall have the right to apply to a court of competent jurisdiction for specific performance and/or for an order restraining any such threatened or further disclosure or misappropriation and for such other relief as the disclosing party shall deem appropriate, such right of the disclosing party to be in addition to the remedies otherwise available to the disclosing party at law or in equity.

NO OBLIGATIONS TO DO BUSINESS

Nothing herein shall be deemed to obligate (CLIENT) to purchase any goods or services from Service provider, or to enter into any further relationship with Service provider.

DISCLAIMER OF OTHER RELATIONSHIPS

This agreement does not create a relationship of agency, partnership, joint venture, or license between the parties.

OBLIGATIONS COVER ALL RELATED DISCUSSIONS

Both (CLIENT) and Service provider intend and agree that the obligations accepted under this Agreement shall be effective retroactively to the date Confidential Information was first disclosed, made available or provided Service provider

EFFECTIVE DATE AND LENGTH OF OBLIGATIONS

The effective date of this agreement is the latter date of acceptance by both parties. Parties’ obligations of confidentiality and non-use for Confidential Information received hereunder shall survive for five years from the termination of this agreement and/or the termination of the agreement as the case may be.

GOVERNING LAW

This Agreement constitutes the entire understanding and agreement of the parties with respect to the subject matter hereof and supersedes all prior and contemporaneous agreements or understandings, inducements or conditions, express or implied, written or oral between the parties with respect to the subject matter hereof. This Agreement may not be amended or supplemented except in a writing signed by both parties. The terms contained herein shall be governed by and construed in accordance with the law of Sri Lanka.

JURISDICTION

The International courts, shall have the exclusive jurisdiction to try all cases arising out of this agreement.

DOCUMENT HOLDERS

Once certificate is printed with the detail you provided to your institution/university/college or registered International Cyber Security license holder, cannot be change any details on the certificate without license holder’s permission

User should get no objection letter from the INTERNATIONAL CYBER SECURITY license holder to change above corrections.

In case if your certificate is damaged or you need to request for an additional certificate you have to pay associated fee to get another fresh cloud certificate.

In case your cloud document is lost, we will take 14 days to issue a fresh cloud certificate behalf of your lost cloud certificate also you need to pay associated payment for new cloud documents charges.

In case if we had to issue your 2nd copy of your cloud document with a different serial number and system code, previous record will be delete from our system.

We print all the cloud certificate with a cue order, you cannot force or make a request to International Cyber Security to print your certificate immediately.

Only the License holder or government courts order have rights to request International Cyber Security to remove your data from our platform.

International Cyber Security will do online verification only, manual verification/certification cannot be done.

Your cloud document is not transferable, and document holder cannot request to remove your data from our system.

All our cloud certificate will be preview in http://icscertify.com/ only, we do not preview our cloud documents in any platforms. In case if any platforms using our cloud documents preview on unauthorized platforms, we will take immediate action against it,

In case it’s failed to preview on our system you must inform to regional provider immediately.

This Document is encrypted and holds the patent rights protection, Trademark Registration No 213718 Invention of any false or forged documents in the name of International Cyber Security is a punishable offence.

This terms and conditions are for International Cyber Security clients and International Cyber Security certified document holders. Terms and conditions for both parties are mentioned in this same document and differs from each other. Terms and conditions related to clients are not meant to document holders and terms and conditions related to document holders and not meant to clients. International Cyber Security has all the rights to change in the terms and conditions without the knowledge of both the parties

Solution

The Need for Protected Documents

The actual extent of document fraud is difficult to establish due to the fact that many businesses do not report their losses, choosing to absorb them rather than face negative publicity. It is estimated that less than one-third of banks report all incidences of check fraud. In addition, no known entity tracks hard-to-quantify items such as fraudulent transcripts and prescriptions.

  • In a survey carried out globally, it was identified from the employment logs of various industries. An alarming rate of 50 per cent of all the job aspirants forging their previous job experience certificates.
  • A 2013 statistics according to Times of India reveal that 75.1 % of irregularities of certifications.

Methods of Fraud

Disgruntled employees alter checks. Scalpers duplicate event tickets. Desperate job seekers forge college transcripts. Shoppers change the value of gift certificates. The facts prove that fraud is a major problem. But before you can protect against something, you have to know and understand what you are protecting against. You have to learn to think like a criminal. Understanding the different types of fraud (theft, alteration and duplication) is necessary when evaluating which s to select.

  • Theft / Embezzlement
    Theft of checks and their eventual use, as well as issuing checks to "ghost" vendors or employees can represent a substantial risk to a corporation. To prevent internal theft or fraud, corporations must assume responsibility for implementing adequate procedures and controls, or "ordinary care."

  • Duplication (Counterfeiting)
    Counterfeiting can be described as the "reproduction of an original document." As recent as fifteen years ago, an investment of $250,000 was needed to purchase printing technology that could produce a fraudulent color document. The criminal had to make a serious investment both in time and money to turn out an acceptable duplicate. Today it's possible to purchase equipment that will allow accurate scanning and printing of documents for under $2,000. Today's computer technology (affordable PCs, color copiers, printers, scanners and desktop publishing software) has moved counterfeiting documents from full-time professional forgers to the "casual" part-time forger.

    To make a counterfeit, criminals will scan an original document into a PC. The counterfeiter can then manipulate the document information (payee, dollar amounts, names, etc.) using desktop publishing software and print as many copies as they wish. While a counterfeit check may not exactly match the genuine check in appearance, it is important to note that counterfeiters need not create an identical document; they need only create one that appears legitimate. Another method of counterfeiting is duplication on color copiers. Today high-end color copiers reproduce color documents that cannot be discerned from the original, even in side-by-side comparisons. With the adjusting of some dials and the push of a button, a near-original quality document can be produced. The availability of walk-up color copiers at public libraries and office supply stores reduces the investment required to just a few dollars.

  • Alteration (Forgery)
    Forgery can be described as the "alteration of an original document." Alterations can be made using various chemicals, erasing or scraping to remove original information. New information is then handwritten, typewritten or inserted with a laser printer or check imprinter. Alteration of an inadequately protected document takes only a matter of minutes and less than $5.

  • Chemical Attack
    Various common chemicals, available quite legitimately for other purposes, are used to remove ink or toner from a document. The type of chemicals used depends upon the type of ink used to write the document.

  • Laser Printed Images
    Toner-based images produced on laser printers can be removed in several ways. First, the information can be scraped off with a sharp object or lifted off using transparent tape. The images can also be removed using fingernail polish remover (acetone).

As document fraudulent has become so prominent across various organisations, authenticity of any paper document or certificates provided by any organisation is questionable.
In order to overcome the complex challenge, ICS developed a distinctive process methodology empowered with the right mix of technology. A unique approach to authenticate documents by the use of state of the art hologram technology coupled with a highly secured cloud system.

How does it work?

When an organisation release a certified document, the document will be sealed by ICS using a resilient hologram label with a unique serial number generated for the specific document alone. Once the hologram label is placed the document will be then scanned and synced to a highly secured cloud system where it would be then stored.
For any organisation to be receiving this services it would require to register prior with ICS reason being to receive an account on the ICS’s cloud based system, where all the documents would be stored securely.
Using the given account the registered organisations would be able to view its documents and other relevant details from anywhere and anytime. Moreover any single individual or organisation which would be using the certified document at any stage apart from the registered firms could also log into the ICS system and check the authenticity of the given document.

Why does it work?

Due to the mixture of hologram labelling with unique serial number and the cloud system, any forged document would require both the hard copy of the document and the serial number to match with the copy secured in the system. Where in any case would be ineffective because if the hard copy is forged easily the copy secured in the system would not match and if the soft copy is forged its vice versa.

About

According to the Paper Industry reports, the use of paper documents is ever so slowly reducing, about 3% in last 10 years. Yet governments, large corporations, SMEs or private citizens continue to use and rely heavily on paper documents when it comes to documentations related important to high value documents.

E-Signature companies employing digital certificates, with Private and Public Key work well to validate the signatory for electronic documents, but are of no use once the document is printed on paper. Therefore, until we become a totally paperless society, the world needs a seamless hybrid but secure solution to address business needs of today.

ICS is the most efficient, easy and secure way to process certified documents and provide them with an affordable yet quality service which will authenticate and validate documents printed on paper.

Why ICS?

  • Security
    Incorporated with industry standards to ensure security of Documents with encryption, biometrics and digital certificates.

  • Compliance
    Meeting or exceeding industry standards in terms of security or compliance is fundamental to us and in maintaining your trust, in order to promote document forensics.

  • Vision

    To create exceptional value for Documents by providing the most efficient, easy & secure way to authenticate certified documents.

    Mission

    To provide the most efficient, easy & secure way to authenticate certified documents.

    Board Members

    Jassim Ismail - Chairman, founder of International Cyber Security.

    Mohamed Aslam Nazar - Managing Director and the Head of Operations.

Contact

Head Office

PO BOX : 2200, COLOMBO SRILANKA
HOTLINE: +94 11 7446 119

Online Forum