Banker who leaked account details for thousands of clients is jailed



A banker who took a bribe to leak the details of 2,500 accounts will spend 10 years in jail.

Dubai criminal court was told that the 28-year-old Indian banker accepted a bribe of Dh55,000 from her compatriot to give him account details for clients living abroad and with a balance of more than Dh500,000.

She was convicted of abusing her position, accepting a bribe, divulging confidential information and with aiding and abetting.

The 35-year-old compatriot and three other men, also from India, were each sentenced to 10 years in prison. Four of the defendants were fined Dh150,000 each while the fifth was fined Dh55,000.
Prosecutors said that the four men checked the information they got from the banker then chose an account belonging to someone who had been out of the country for a long time.

They forged several documents, including a power of attorney attributed to the bank account holder, and submitted them to Etisalat to obtain a Sim card in his name. They were then sent the online banking password on that number, which they used to make seven transfers totalling Dh1.1m from the victim's account.  
All four were found guilty of offering bribes, forgery, use of forged documents, embezzlement and adding and abetting.
The Indian victim had been on a visit to his home country and had deactivated his UAE telephone for the duration of his trip.

Upon his return to the UAE a month later, in January 2016, the 61-year-old businessman was told that two cheques he had issued had bounced.
"When I visited my bank to inquire, they told me my account had been frozen after they discovered embezzlements from it," said the man.
One of the transfers made from his account was to another account with the same bank. Investigations into that transfer led police to one of the defendants who in turn tipped them off about his accomplices.
"I also visited Etisalat and was told that I applied for a replacement number, which I told them was not true," he said.
All five will be deported after serving their prison terms but the sentence can be appealed within two weeks.

Business Insights
  • As per the document, there are six filing options, including choosing to report on a realisation basis and transitional rules for pre-tax period gains or losses. 
  • SMEs with revenue below Dh3 million per annum can opt for transitional relief until 2026, treating them as having no taxable income. 
  • Larger entities have specific provisions for asset and liability movements, business restructuring, and handling foreign permanent establishments.
A timeline of the Historical Dictionary of the Arabic Language
  • 2018: Formal work begins
  • November 2021: First 17 volumes launched 
  • November 2022: Additional 19 volumes released
  • October 2023: Another 31 volumes released
  • November 2024: All 127 volumes completed
Juliot Vinolia’s checklist for adopting alternate-day fasting

-      Don’t do it more than once in three days

-      Don’t go under 700 calories on fasting days

-      Ensure there is sufficient water intake, as the body can go in dehydration mode

-      Ensure there is enough roughage (fibre) in the food on fasting days as well

-      Do not binge on processed or fatty foods on non-fasting days

-      Complement fasting with plant-based foods, fruits, vegetables, seafood. Cut out processed meats and processed carbohydrates

-      Manage your sleep

-      People with existing gastric or mental health issues should avoid fasting

-      Do not fast for prolonged periods without supervision by a qualified expert

Know your cyber adversaries

Cryptojacking: Compromises a device or network to mine cryptocurrencies without an organisation's knowledge.

Distributed denial-of-service: Floods systems, servers or networks with information, effectively blocking them.

Man-in-the-middle attack: Intercepts two-way communication to obtain information, spy on participants or alter the outcome.

Malware: Installs itself in a network when a user clicks on a compromised link or email attachment.

Phishing: Aims to secure personal information, such as passwords and credit card numbers.

Ransomware: Encrypts user data, denying access and demands a payment to decrypt it.

Spyware: Collects information without the user's knowledge, which is then passed on to bad actors.

Trojans: Create a backdoor into systems, which becomes a point of entry for an attack.

Viruses: Infect applications in a system and replicate themselves as they go, just like their biological counterparts.

Worms: Send copies of themselves to other users or contacts. They don't attack the system, but they overload it.

Zero-day exploit: Exploits a vulnerability in software before a fix is found.