SlideShare a Scribd company logo
1 of 1
Download to read offline
Scam-Proof Your Senior Checklist
About seven in 10 crimes against older Canadians are never reported to police because victims did not believe the incident
was important enough to seek help or because they dealt with the issue personally, according to Statistics Canada. Shame and
embarrassment can play a role in an older adult’s reluctance to talk about being scammed.
Family members may help seniors avoid the humiliation and potential financial devastation of a con. The Home Instead Senior Care®
network along with North American Security experts and the Canadian Council of Better Business Bureaus, recommend these tips to
help keep seniors from being exploited.



Shred documents that could be useful to criminals, including bank statements, credit card statements and offers, and
other financial information. Documents that need to be preserved, such as tax filings and car titles, should be stored in a
safe deposit box.



Insist that your senior check with the Canadian Council of Better Business Bureaus before he or she acts on a phone
call or a piece of mail, or agrees to a visit from an unknown person, business or charity. Point out suspicious mailings,
especially look-alike envelopes that mimic letters sent from Revenue Canada.



Add seniors to the national Do-Not-Call Registry. Instruct them to hang up if they get solicitation calls. Address the guilt
factor by reminding an older adult it can be difficult to recognize a scam.



Insist that your senior never give out personal information nor agree to give money over the phone, rather ask for written information to be sent through the mail. The best rule of thumb is to “never provide information in a phone call that
you did not initiate.”



Make sure a charity is registered with the Canadian government. Make a written “giving plan” together: list which
organizations the senior intends to support, and stick to it.



Establish a strong defense by posting a “No Solicitation” notice by a senior loved one’s front door and help your senior
to sort through his or her incoming mail. Watch TV with a loved one to monitor interest in infomercials or shopping
shows.



Remember that all new technology has a learning curve. Educate your senior loved one about email and phishing tactics.



Watch for individuals who have befriended your loved one. Lonely or isolated seniors may be vulnerable to criminals
who befriend them and provide companionship. Ask to talk to your parent’s new friend to find out more. A thief likely
won’t stick around long to chat.



Seniors who are scammed may be embarrassed and try to hide what happened. Watch for changes in their lifestyle as
well as any other unusual financial or business activity. If a senior can no longer handle his or her finances, encourage your
loved one to put a plan in place that can help ensure bills are paid and assets are protected. That plan may include your
senior designating a financial power of attorney or a representative to monitor credit card use, especially if he or she has
dementia.



If you can’t be there for your senior, find trustworthy people who can serve as eyes and ears for seniors by screening
door-to-door scammers and others who seek to exploit by telephone or computer. Helpers could be neighbours,
relatives, friends, faith community members or professional caregivers such as those from the Home Instead Senior Care
network.

For more information about protecting your seniors from scammers,
contact your local Home Instead Senior Care® office, or visit
ProtectSeniorsFromFraud.com.

Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.

More Related Content

Viewers also liked

Healthy eatonvill evoice
Healthy eatonvill evoiceHealthy eatonvill evoice
Healthy eatonvill evoicenannette64
 
πολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρηςπολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρηςteacher88
 
Hao hsiang ma resume
Hao hsiang ma resumeHao hsiang ma resume
Hao hsiang ma resumeEliot Ma
 
Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian - Mark - Fullbright
 
Terry Webb Resume_Final
Terry Webb Resume_FinalTerry Webb Resume_Final
Terry Webb Resume_FinalTerry Webb
 
Concrete Cutting & Breaking
Concrete Cutting & BreakingConcrete Cutting & Breaking
Concrete Cutting & Breakingconcut
 
Ubuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning TalkUbuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning TalkFukuda Takuro
 
Creating Gradle Plugins
Creating Gradle PluginsCreating Gradle Plugins
Creating Gradle PluginsAnnyce Davis
 
"SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ..."SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ...Anna Zarudzka
 

Viewers also liked (13)

2º eso unit 9
2º eso unit 92º eso unit 9
2º eso unit 9
 
For susah
For susahFor susah
For susah
 
Healthy eatonvill evoice
Healthy eatonvill evoiceHealthy eatonvill evoice
Healthy eatonvill evoice
 
πολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρηςπολική αρκούδα Λευτέρης
πολική αρκούδα Λευτέρης
 
Hao hsiang ma resume
Hao hsiang ma resumeHao hsiang ma resume
Hao hsiang ma resume
 
Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian Senior Fraud Protection Kit - Canadian
Senior Fraud Protection Kit - Canadian
 
Terry Webb Resume_Final
Terry Webb Resume_FinalTerry Webb Resume_Final
Terry Webb Resume_Final
 
Concrete Cutting & Breaking
Concrete Cutting & BreakingConcrete Cutting & Breaking
Concrete Cutting & Breaking
 
Mosqueteros
MosqueterosMosqueteros
Mosqueteros
 
Ubuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning TalkUbuntu Japanese Team Lightning Talk
Ubuntu Japanese Team Lightning Talk
 
El mobbing power point 3
El mobbing power point 3El mobbing power point 3
El mobbing power point 3
 
Creating Gradle Plugins
Creating Gradle PluginsCreating Gradle Plugins
Creating Gradle Plugins
 
"SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ..."SCRUM allows us to create better products, more suited to the users' needs. ...
"SCRUM allows us to create better products, more suited to the users' needs. ...
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 

Recently uploaded (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 

Scam Proof Your Senior Checklist - Canadian

  • 1. Scam-Proof Your Senior Checklist About seven in 10 crimes against older Canadians are never reported to police because victims did not believe the incident was important enough to seek help or because they dealt with the issue personally, according to Statistics Canada. Shame and embarrassment can play a role in an older adult’s reluctance to talk about being scammed. Family members may help seniors avoid the humiliation and potential financial devastation of a con. The Home Instead Senior Care® network along with North American Security experts and the Canadian Council of Better Business Bureaus, recommend these tips to help keep seniors from being exploited.  Shred documents that could be useful to criminals, including bank statements, credit card statements and offers, and other financial information. Documents that need to be preserved, such as tax filings and car titles, should be stored in a safe deposit box.  Insist that your senior check with the Canadian Council of Better Business Bureaus before he or she acts on a phone call or a piece of mail, or agrees to a visit from an unknown person, business or charity. Point out suspicious mailings, especially look-alike envelopes that mimic letters sent from Revenue Canada.  Add seniors to the national Do-Not-Call Registry. Instruct them to hang up if they get solicitation calls. Address the guilt factor by reminding an older adult it can be difficult to recognize a scam.  Insist that your senior never give out personal information nor agree to give money over the phone, rather ask for written information to be sent through the mail. The best rule of thumb is to “never provide information in a phone call that you did not initiate.”  Make sure a charity is registered with the Canadian government. Make a written “giving plan” together: list which organizations the senior intends to support, and stick to it.  Establish a strong defense by posting a “No Solicitation” notice by a senior loved one’s front door and help your senior to sort through his or her incoming mail. Watch TV with a loved one to monitor interest in infomercials or shopping shows.  Remember that all new technology has a learning curve. Educate your senior loved one about email and phishing tactics.  Watch for individuals who have befriended your loved one. Lonely or isolated seniors may be vulnerable to criminals who befriend them and provide companionship. Ask to talk to your parent’s new friend to find out more. A thief likely won’t stick around long to chat.  Seniors who are scammed may be embarrassed and try to hide what happened. Watch for changes in their lifestyle as well as any other unusual financial or business activity. If a senior can no longer handle his or her finances, encourage your loved one to put a plan in place that can help ensure bills are paid and assets are protected. That plan may include your senior designating a financial power of attorney or a representative to monitor credit card use, especially if he or she has dementia.  If you can’t be there for your senior, find trustworthy people who can serve as eyes and ears for seniors by screening door-to-door scammers and others who seek to exploit by telephone or computer. Helpers could be neighbours, relatives, friends, faith community members or professional caregivers such as those from the Home Instead Senior Care network. For more information about protecting your seniors from scammers, contact your local Home Instead Senior Care® office, or visit ProtectSeniorsFromFraud.com. Each Home Instead Senior Care ®franchise office is independently owned and operated. Copyright ©2012 Home Instead, Inc.