Fraud Policy
Effective Date: 05/31/2025
Last Updated: 05/31/2025
1. Purpose
Coropos Web Services is committed to operating with integrity and protecting our clients, team, and business from fraudulent behavior. This Fraud Policy outlines how we detect, respond to, and prevent fraudulent activity within our operations.
2. What Constitutes Fraud
Fraud includes, but is not limited to:
- Submitting false information or fake identities
- Offering or requesting third-party payments through Coropos
- Using stolen credit cards or financial data
- Emotional manipulation to expedite transactions
- Requests to transfer or relay money unrelated to our services
3. Fraud Detection Procedures
We use a combination of manual review and behavioral analysis to identify red flags. Common indicators include:
- Unusually large budgets for small projects
- Requests to pay external “consultants” or “designers” on a client’s behalf
- Unverifiable business or identity information
- Emotional appeals (e.g., urgent medical situations)
- Unusual communication patterns or payment instructions
4. Verification Requirements
If a request is flagged for potential fraud, we will pause all activity and request at least two of the following verification categories:
4.1 Identity Verification (choose one)
- Government-issued photo ID (redacted if needed)
- Live video call verification
4.2 Business Verification (choose one)
- Registered business website or listing
- Business license, EIN, or certificate of formation
- Email from a domain-matching business account
4.3 Payment Verification (choose one)
- Signed agreement from the payer
- Payment from a verified source you control (Stripe, PayPal, etc.)
- Verified business account (no intermediaries)
5. Actions Upon Detection
When fraud is suspected or confirmed, we will take one or more of the following actions:
- Immediately pause the project or communication
- Request verification from the client
- Report fraud to payment processors, hosting providers, or authorities
- Deny or terminate the client relationship
6. Documentation
All suspected fraud cases are internally documented. This includes:
- Client communication logs
- Redacted messages and quote requests
- IP location data or email metadata (when available)
Upon request, a redacted version of this report may be shared with the flagged party for transparency.
7. Zero-Tolerance Policy
Important: We do not process or forward funds to any third party. Any request to do so will result in immediate disqualification from working with Coropos Web Services.
8. Reporting Fraud
If you believe you’ve encountered someone fraudulently representing Coropos Web Services, or if you’ve received suspicious communication from us, please report it immediately:
9. Updates to This Policy
This Fraud Policy may be updated at any time. The “Last Updated” date will reflect changes. We encourage users and clients to review this page regularly.