It is essential that you are familiar with original documents in order to be able to carry out the comparison.
If you suspect that the identification document is fake, ask the person to present another document. This way, you can compare the information and, if you find any inconsistencies, you can question the bearer and even prevent a transaction with false information from taking place.
3. Use validation sites
Remember that fake documents can be circulated physically or online . And if you don't know how to identify a fake document, from now on you will have the help of technology to avoid falling for scams.
There are websites that validate the authenticity of digital china mobile database documents using verification codes . Digitally signed documents can also be verified. The authenticity of the document and the signature can be verified by checking the file's characteristics.
Bonus: Check legal validity
Digital documents with electronic signatures have three pillars that validate them before the law. Provisional Measure 2200-2/2001 establishes the following standards for documents signed in electronic media:
Integrity;
Authorship of the party;
Acceptance between the parties.
This means that with the right scanning software , you can identify whether:
The document underwent changes before and after being signed;
The identity of the signatory is truthful;
The signatory has agreed to electronically sign the document.
Archiving - Meet the Archiving Academy
How to avoid document fraud?
In addition to knowing how to identify fake documents, it is important that you learn how to avoid fraud in your company's documents. After all, you may receive forged documents, as well as have your data in the possession of malicious people.
What to do, after all?
Digitize your documents
First, keep in mind that digital documents are protected against alterations and data leaks. This is because good electronic signature and electronic document management software has features to ensure the standards established by law , in addition to including passwords, encryption and other security tools.