Online Registration Form:
When & Where:
Wednesday October 9, 2013
AMVETS Post #2256
818 Tarlton Road
Circleville, Ohio 43113
Master of Ceremonies
Deputy Dale Gillette, TRIAD Coordinator
Registration & Continental Breakfast
Provided by the Pickaway Senior Center
8:00 a.m. Invocation -
Chaplain Doyne N. Wiggins,
Pickaway County Sheriff’s Office
8:05 a.m. Pledge / Welcome -
Robert B. Radcliff, Pickaway County Sheriff
Judy Wolford, Pickaway County Prosecutor
Alzheimer’s Association of Central Ohio
Pickaway County Adult Protective Services
Jessica Mullins, V.P. The Savings Bank
Ursel McElroy Drake,
Ohio Attorney General’s Office
Questions / Discussion -
Why Should I Attend?
Financial exploitation of the elderly is becoming an increasingly familiar problem. Regular review of news headlines reveals that elders and vulnerable adults are victimized routinely by frauds, scams and identity theft, at the hands of strangers as well as loved ones, not only in the United States, but throughout the world. As technology advances, perpetrators keep step by becoming more creative.
Older individuals may be targeted merely because they possess more assets, such as savings, annuities and retirement accounts, stocks and bonds, insurance policies, and property than younger people. Those with cognitive impairments, mental health conditions, or physical disabilities may be dependent upon others (family members, friends, formal and informal caregivers, or court appointed representatives) for assistance in making financial decisions or carrying out daily transactions, and therefore may be even more vulnerable to theft, exploitation or undue influence.
Theft, fraud, misuse or neglect of authority, and use of undue influence as a lever to gain control over an older person’s money or property.
This FREE training is being offered to the financial institutions of Pickaway County and our Senior Community.
Attendees will learn how to recognize some of the common signs of financial exploitation, explanation of the law and voluntary reporting requirements, identify theft, mail fraud, and how to make a report to proper authorities.
You do not need to prove that exploitation is occurring; it is up to the professionals to investigate the suspicions.