Overview We have recently identified an increase in instances where users share fake or edited screenshots to support their queries. This poses a significant risk and requires all associates to exercise heightened vigilance. When reviewing user-provided images, carefully examine whether any of the following signs are present:
Required Actions When Suspicious Activity Is DetectedIf you believe an image or snapshot may be falsified or tampered with:
NoteIf something appears unusual or inconsistent, it is important to trust your initial assessment. Early detection is essential in preventing misuse and ensuring accurate resolution. |
Identifying Fake Snapshots & Risk Escalations Print
Created by: Eeman.shabbir
Modified on: Mon, 17 Nov, 2025 at 3:55 AM
Did you find it helpful? Yes No
Send feedbackSorry we couldn't be helpful. Help us improve this article with your feedback.