Identity Crime
Identity theft involves criminals obtaining and misusing someone's personal data to commit fraud. It can happen to anyone, including your employees, suppliers and customers.
This type of fraud makes up most of all fraud recorded on the National Fraud Database. One of the main reasons for this is the availability of large quantities of personal details online.
Our Identify Theft Training Course will help your employees prevent this crime by understanding how it works and what to do if they spot the tell-tale signs.
- 20 Minutes
- All staff
- Based on UK legislation, but suitable for global audiences upon the removal of UK-specific references and translation as necessary.
Learning objectives
- Explain identity theft and its consequences
- Understand identity-theft risks and red flags
- Recognise the signs of identity theft
- Know how to proceed if you suspect identity theft
What can you expect your employees to learn?
Introduction
What is identity theft?
- Types of identity crime
How identity theft occurs
- Identity crime: A real threat
Best practice for preventing identity theft
- You make the call: Could it be identity theft?
Scenario: A customer calls
- Scenario: The caller dupes Kate
- Increase in cases of identity theft
- Scenario: After the theft
- Scenario: Account takeover
- Scenario: The debit card
Reporting & whistleblowing
Summary
Affirmation
Assessment
Start your compliance e-learning journey with a free trial
Our no-obligation free trial gives you access to our libraries and compliance platform.
Ready to start your free trial? Complete the form, and a member of the Skillcast team will be in touch with further details.
Your questions, answered
Fraud Prevention
Public Sector
Common FAQs
How can I ensure employees are aware of our Fraud Prevention policies and procedures?
How can employees report suspicions of fraud anonymously?
How can I make sure every employee has read and agreed to our anti-fraud and conduct policies?
How can I measure my employees’ awareness of fraud risks and identify gaps in understanding?
How can I provide employees with a safe and anonymous way to report suspected fraud?
What are the most common types of fraud in construction?
- Bid rigging and collusion during tendering
- False invoicing and overbilling
- Theft or misuse of materials and equipment
- Manipulation of progress reports or timesheets
- Warranty or insurance fraud after project completion
Why is the construction industry especially vulnerable to fraud?
How can companies detect fraud early?
Early detection is about combining good oversight with smart tools. For example:
- Monitoring financial records for irregular billing.
- Using data analytics to flag suspicious payment patterns.
- Carrying out site inspections and inventory checks.
- Providing safe, anonymous channels for employees to raise concerns.
What role does leadership play in fraud prevention?
- Making anti-fraud policies clear and accessible.
- Enforcing rules consistently — no exceptions for "star performers."
- Rewarding ethical behaviour alongside project results.
Are Skillcast courses SCORM-compliant?
What other tools are needed beyond training?
Is our training content still compliant with the latest legislation?
- You can check the latest course content updates in our library updates page: https://www.skillcast.com/compliance-course-library-updates
- For major legislative changes, we:
- Send you email alerts to ensure you are notified
- Offer you a free trial of newly created or updated content
- Host webinars with compliance experts to explain the changes and how our training supports your ongoing compliance
Can you translate our content into other languages?
What file types are supported by the Skillcast system?
Features |
Supported file types and details |
|
File Exchange |
File types: PDF, Excel spreadsheets, Word documents, SCORM and xAPI files, and compressed zip files. Max file size: Default is 1GB, can be increased to a max of 2GB |
|
SCORM files |
Versions: SCORM 1.2, SCORM 1.2 for Moodle, SCORM 2004 2nd, 3rd and 4th Edition. Max file size: 1024MB |
|
xAPI file |
Max file size: 2GB |
|
Videos |
File types: MP4 or MOV. Videos must be optimised, with a max file size of 100MB. If the file is bigger, our Design Team can help |
|
Images |
File types: jpg, png and gif. The file size should ideally be 100KB, but it can be up to 250KB |
|
CPD evidence |
File types: Word, PDF, Excel and CSV. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Policy documents |
PDF or Word File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Offline activities evidence |
File types: PDF, DOC, DOCX, XLS, XLSX, CSV, PNG, GIF, JPEG, JPG, PPTX and MSG. File size: the limit should be whatever the portal config option is set to. Servers are set to max 2GB |
|
Client logo files |
File types provided by client: EPS, PDF, AI and SVG |
|
Registers |
PDF, DOC, DOCX, XLS, XLSX, CSV, PPT, PPTX, POT, PPA, PPS, JPG, JPEG, PJEPG, PNG, BMP, GIF, MP4, MOV, WMV, CPTX, CP, TXT, ZIP and MSG files |
|
Declarations |
JPG, JPEG, PNG, GIF, XLS and XLSX files |
Related courses
Boost your compliance efforts with our range of courses. Varying in length and topic, our courses equip you with the tools to create an ethical and resilient workplace.
Phishing
It's essential for your employees to know what phishing is, how to spot the signs of an attempt and how to protect themselves and your Company.
Fraud Prevention
Fraud is criminal or deceptive behaviour aiming to secure an unfair or unlawful gain through deliberate or dishonest misrepresentation.
Manual Handling
Educate your staff on the controls that your Company has in place and what measures they should implement to reduce the risks when lifting and handling at work.
DSE
Educate your staff on the controls that your Company has in place and how they can prevent ill-health if they regularly use Display Screen Equipment (DSE) at work.
Understanding Modern Slavery
Modern slavery remains a persistent, inhumane practice affecting millions through forced labour, trafficking and exploitation.
Understanding Bribery
Bribery is not always obvious and can take many subtle forms, from lavish gifts to preferential treatment.
Gifts and Hospitality
Gifts and hospitality can create a risk of actual or perceived bribery if not handled correctly.
Spot a Phishing Attempt
Phishing emails are fraudulent attempts by cybercriminals to trick individuals into revealing sensitive information.
Abuse of Position
Fraud by abuse of position occurs when someone in a position of trust dishonestly exploits their role for personal gain or to cause loss to others.
Whistleblowing
Whistleblowing is the act of reporting wrongdoing such as fraud, bribery or safety breaches to protect an organisation and its stakeholders.
Money Laundering Red Flags
Detecting and reporting money laundering red flags is essential for maintaining anti-money laundering (AML) compliance.
Business Email Compromise
Business Email Compromise (BEC) is a targeted cyberattack where criminals impersonate executives or hack accounts to steal money or sensitive information.
Understanding Fraud
Fraud is a deliberate act of deception aimed at obtaining an unfair advantage, often causing harm to individuals or organisations.
Display Screen Equipment
Correctly setting up display screen equipment (DSE) is crucial for maintaining comfort and preventing strain or injury.
Identity Fraud
Identity fraud occurs when criminals steal personal information to commit fraud, often leading to financial loss and reputational damage.
Slips and Trips
Slips and trips are among the most common causes of workplace injuries, often resulting in serious harm such as fractures or concussions.
Manual Handling
Manual handling tasks, such as lifting, carrying, pushing or pulling objects, can lead to injuries if not done correctly.
Display Screen Equipment (DSE)
Educate your staff on the controls that your Company has in place and how they can prevent ill-health if they regularly use Display Screen Equipment (DSE) at work.
Slips and Trips
Educate your staff on the controls that your Company has in place and what they should do to prevent slips and trips at work.
General Office Hygiene
Educate your staff on general office hygiene protocols to reduce common viruses and infections from spreading at the workplace.
Driving at Work
Educate your staff on the controls your Company has in place and what they should do to eliminate or manage the risks when driving at work.
Understanding Conflicts of Interest
A conflict of interest is where competing interests interfere with the exercising of judgement in a relationship.
Compliments vs Sexual Harassment
Genuine compliments can be part of a positive workplace, but inappropriate remarks can cross the line into sexual harassment.
Failing to Disclose Information
Fraud can occur when someone deliberately withholds information to gain an unfair advantage or cause loss to others.
Targets of Sexual Harassment
Sexual harassment can occur in various forms and affects everyone in the workplace.
Crossing the Line into Sexual Harassment
Sexual harassment is not limited to physical actions but can also involve words, gestures and persistent unwanted attention.
Understanding Harassment
Harassment is unwanted conduct that violates a person’s dignity or creates an intimidating or offensive environment.
Forced Labour Indicators
Forced labour is a serious violation of human rights, often hidden within workplaces and supply chains.
Dealing With Stress at Work
Workplace stress can arise from tight deadlines, high-pressure environments and personal challenges.
Deepfake Awareness
Deepfakes use artificial intelligence to create fake images, audio or videos that can deceive individuals and organisations.
Understanding Information Security
Information security is essential to protect sensitive business and customer data from unauthorised access, breaches and cyber threats.
Common Cyber Threats
Cyber threats such as phishing, malware, ransomware and unsecured networks pose significant risks to businesses.
Understanding the GDPR
The General Data Protection Regulation (GDPR) sets out key principles for handling personal data and protecting individuals' rights.
Personal Data Breaches
Personal data breaches can occur through hacking, human error or unauthorised access, leading to serious legal and reputational consequences.
Understanding Sexual Harassment
Sexual harassment is unwanted behaviour of a sexual nature that violates a person’s dignity or creates an intimidating, hostile or offensive environment.
Understanding Facilitation Payments
Facilitation payments are small, unofficial payments made to speed up routine services, but they are considered bribes under anti-bribery and corruption laws.
Malware
Malware is malicious software designed to harm or exploit computer systems, ranging from viruses and ransomware to spyware and botnets.
Ransomware
Ransomware is a type of malware that encrypts files and demands payment for their release, often causing severe financial and operational damage.
Smishing
Smishing is a targeted phishing scam that uses deceptive text messages to gain sensitive information.
Spear Phishing
Spear phishing targets specific individuals with convincing emails designed to deceive them.
Video Conferencing
Video conferencing is a vital business tool, but it also presents security and privacy risks if not used correctly.
Vishing
Vishing is a social engineering attack where cybercriminals use phone calls to trick individuals into revealing sensitive information.
Creating Strong Passwords
Strong password protection is essential to safeguarding company systems from cyber threats such as brute force attacks and password guessing.
Multi-factor Authentication
Multi-factor authentication (MFA) enhances security by requiring users to verify their identity through multiple authentication methods.
Reacting to Password Breaches
Password breaches can lead to unauthorised access, fraud and data theft, often resulting from weak passwords, phishing or insecure networks.
Information Security on the Move
Handling company information securely, especially when working remotely or traveling, is essential to prevent data breaches and security risks.
Secure Web Browsing
Practicing safe web browsing helps to reduce security risks and protect sensitive information.
Transferring Information Securely
Securely transferring information is essential to protect sensitive data from breaches, legal risks and business disruptions.
Using Wi-Fi safely
Wi-Fi connectivity offers convenience but also exposes devices and data to security risks if not properly managed.
Guide to Secure Remote Working
Remote work provides flexibility but also introduces cybersecurity risks that can compromise company data and systems.
Think Before You Click
Clicking on malicious links or attachments is one of the most common ways cybercriminals infect IT systems with malware.
Neurodiversity Awareness
Misunderstanding neurodiversity can leave employees unsupported and limit workplace potential.
Bribery Offences and Penalties
Bribery is a serious offence that carries severe consequences for individuals and companies.
Controllers and Processors
The differences between data controllers and data processors are crucial to understanding data protection obligations.
GDPR Principle 1
The first principle of the GDPR requires that personal data must be processed lawfully, fairly and transparently.
GDPR Principle 2
The second principle of the GDPR, purpose limitation, requires that personal data be collected for specified, explicit and legitimate purposes.
GDPR Principle 3
The third principle of the GDPR, data minimisation, requires that personal data collected must be adequate, relevant and limited to what is necessary.
GDPR Principle 4
The fourth principle of the GDPR, accuracy, requires that personal data must be correct, up to date and not misleading.
GDPR Principle 5
The fifth principle of the GDPR, storage limitation, requires that personal data be retained only for as long as necessary for its intended purpose.
GDPR Principle 6
The sixth principle of the GDPR, integrity and confidentiality, requires that personal data be protected against unauthorised access, loss or damage.
GDPR Principle 7
The seventh principle of the GDPR, accountability, requires organisations to take responsibility for compliance and demonstrate good governance in data protection.
GDPR and Consent
Consent is one of the six lawful bases for processing personal data under the GDPR, requiring individuals to give clear, informed and voluntary agreement.
GDPR Individual Rights
The General Data Protection Regulation (GDPR) grants individuals eight specific rights over their personal data, ensuring transparency and control.
Risks in the Use of AI
This training highlights how AI can be used effectively while identifying and addressing potential risks.
Direct Discrimination
Discrimination occurs when individuals are treated unfairly due to characteristics like sex, age, race or disability.
Indirect Discrimination
Indirect discrimination occurs when seemingly neutral policies disadvantage certain groups based on protected characteristics like age, sex, disability, race and religion.
The Protected Characteristics
The UK's Equality Act protects individuals from discrimination based on nine protected characteristics, ensuring a fair and inclusive workplace.
Victimisation
Victimisation occurs when someone is treated unfairly for making or supporting a complaint under the Equality Act.
Stereotyping
Stereotypes are generalised beliefs about individuals or groups that can lead to prejudice and bias.
Unconscious Bias
Unconscious bias occurs when we make judgments about people based on past experiences, cultural influences or assumptions.
Identifying Who is Vulnerable
Vulnerable individuals are those who face heightened risks of harm, abuse, neglect or exploitation due to various circumstances.
Screening Employees in Safeguarding Roles
The Safeguarding Vulnerable Groups Act protects children and vulnerable adults from harm by preventing unsuitable individuals from working with them.
Customer Fraud
Customer fraud poses serious risks to businesses, from chargeback fraud to false complaints.
Supplier Fraud
Supplier fraud occurs when vendors engage in deceptive practices, such as false invoicing, overpricing or bribery.
Authorised Push Payment Fraud
Authorised push payment fraud occurs when scammers impersonate trusted figures to trick individuals into transferring money.
False Representation
Fraud by false representation happens when someone deliberately provides misleading or untrue information for personal or financial gain.
Economic Crime and Corporate Transparency Act 2023
The Economic Crime and Corporate Transparency Act 2023 expands corporate liability for fraud and financial crimes.
Employee Fraud and Insider Threats
Employee fraud can take many forms, from theft and false expense claims to data misuse and conflicts of interest.
Fraud Offences and Penalties
Fraud is any dishonest action or omission intended to gain or cause a loss, regardless of whether it is temporary or permanent.
Mandatory Leave
Mandatory leave is time off that certain organisations enforce to help prevent fraud, errors and other risk incidents.
Preventing Corporate Fraud
Corporate fraud involves illegal activities committed by an organisation or individuals acting on its behalf.
The Fraud Triangle
Fraud is often committed by ordinary people who find themselves in difficult situations and make poor choices.
COSHH
Exposure to hazardous substances in the workplace can cause serious health conditions, including respiratory diseases and skin disorders.
Menopause Awareness
Menopause is a natural stage in life that can bring physical and emotional challenges and potentially affect work performance.
Mental Health at Work
Stress, anxiety and depression are major workplace health risks, accounting for over half of work-related ill-health cases.
New and Expectant Mothers at Work
When an employee is pregnant or returning from maternity leave, certain legal rights and health considerations apply.
Right to Work in the UK
Before hiring anyone, it's important to confirm that they have the right to work in the UK.
Agency Worker Regulations
Agency workers have specific rights under the Agency Workers Regulations, ensuring fair treatment in workplaces.
Managing Absence
Absences from work can occur for many reasons, ranging from illness to personal leave.
Managing Discipline
Disciplinary procedures address workplace misconduct and poor performance through a fair and structured process.
Managing Grievances
Workplace grievances are concerns or complaints related to job tasks, working conditions or interpersonal relationships.
Managing Performance
Performance management is an ongoing process that aligns employee contributions with an organisation’s goals.
The Three Characteristics of Harassment
Harassment in the workplace occurs when unwanted behaviour violates a person's dignity or creates an intimidating or offensive environment.
Unwanted Behaviour of a Sexual Nature
Sexual harassment is unwanted behaviour of a sexual nature that can create an intimidating, degrading or hostile work environment.
The 4D Bystander Intervention Model
Creating a safe and respectful workplace requires everyone to take action when witnessing bullying harassment or inappropriate behaviour.
Abuse of Position
Abuse of position is a type of fraud that employees can commit, sometimes inadvertently, when they use their position at the Company for their personal gain.
Preventing Radicalisation
Prevent is a UK initiative whose primary aim is stopping people from becoming terrorists or supporting terrorism.
Right to Work in the UK
There are two key laws that make it harder for people with no right to work in the UK to gain or retain employment.
Managing Remote Workers
Remote working is a type of flexible working that covers a range of agreements.
Accident Reporting and Investigation
Learn how to pinpoint incidents that need reporting, understand the depth of causes from immediate to root, differentiate active from latent failures, and confidently navigate the HSE's six-step accident investigation.
Asbestos
Educate your staff on the risks posed by asbestos, the controls your Company has in place, and what you should do to manage these risks and stay safe.
Control of Substances Hazardous to Health (COSHH)
Educate your staff on the risks of using hazardous substances as well as what they should do to prevent accidents and incidents when using them.
Financial Integrity
The integrity of financial reports is paramount for any company.
Fraud Prevention for Managers
The consequences of fraud are very serious for both companies and employees alike.
Managing Safely
Managers need a deeper understanding of issues, systems and procedures to empower them to deal with the health and safety of their teams.
New and Expectant Mothers at Work
Being a new or expectant mother is an exciting time.
Personal Protective Equipment (PPE)
Learn about the selection, use, legal requirements and maintenance of PPE to ensure workplace health and safety compliance.
Violence and Aggression
Educate your staff on the controls your Company has in place and what they should do to safely manage situations with the risk of violence and aggression.
Work Equipment
Educate your staff on the controls that your Company has in place and what measures they should implement to reduce the risks when using equipment at work.
Work-related Stress
Educate your staff on the controls that your Company has in place and what they should do to prevent and manage stress in the workplace.
Fraud Prevention
Fraud is criminal or deceptive behaviour aiming to secure an unfair or unlawful gain through deliberate or dishonest misrepresentation.
IR35
IR35 is a UK tax rule designed to ensure that contractors using intermediaries like personal service companies (PSCs) pay similar tax and National Insurance to employees, when appropriate.