AmCham Receivables Management Workshop 11 April 2006 Warsaw Iris Paeschke Consultant Control Risks.

Slides:



Advertisements
Similar presentations
International partnership of law companies Customs & Corporate Lawyers, based on the principles of observance of high professional standards, mutual trust,
Advertisements

How To Improve Your Credit Score
Maximising Recoveries Some observations Andrew Campbell.
Welcome to Awras Consultancy Ltd. Portfolio Awras Consultancy Ltd. Portfolio
Chapter 1 Business Driven Technology
COFACE EMIRATES SERVICES B2B COLLECTIONS 1. “DEBT COLLECTION PROSPERS ON THE BACK OF ECONOMIC TURMOIL”
Freshfields Bruckhaus Deringer LLP Global investigations What to advise your board Marius Berenbrok Edward Braham Matthew Herman Melissa Thomas 29 February.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Protecting Personal Information Guidance for Business.
Getting Paid For New Business DANIEL COTTRELL HEAD OF CIVIL LITIGATION QUALITYSOLICITORS KNIGHT POLSON 24 MARCH 2015 Private and Confidential.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
Copyright© 2010 WeComply, Inc. All rights reserved. 5/7/2015 Careful Communication.
The Legal Series: Employment Law I. Objectives Upon the completion of training, you will be able to: Understand the implications of Title VI Know what.
Advanced Civil Litigation Class 6Slide 1 Steps in Filing a Complaint First, the necessary complaint must be prepared. Make sure you attach the: First,
Company Profile and Debt Recovery Process
Convergys Confidential and Proprietary Copyright © 2007 Convergys Corporation Designing for Business and Users: Finding the Perfect Blend Erin Smith Convergys.
Bankruptcy, Reorganization, and Liquidation
Risk Identification Chapter 6.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Health Informatics Series
Chapter 5: Project Scope Management
SSCL COPORATE FUNCTIONAL SAFETY MANAGEMENT Chris Goring Safety Systems Consultants Ltd.
Forensic Accountant Steven Auerbach. Forensic Accountant  Forensic accountants are experienced auditors and investigators of financial documents who.
Performance Testing Design By Omri Lapidot Symantec Corporation Mobile: At SIGiST Israel Meeting November 2007.
Network security policy: best practices
IT Job Roles Task 20. Software Engineer Job Description Software engineers are responsible for creating and maintaining software of various different.
Welcome ISO9001:2000 Foundation Workshop.
Chapter 4 Risk Assessment.
Internal Auditing and Outsourcing
Improving productivity with online collaboration © 2015 albert-learning.com Improving productivity with online collaboration.
Alexander Consulting Enterprise 9/7/2015 Marketing Research in Global Markets Why Bother?
C4- Social, Legal, and Ethical Issues in the Digital Firm
Litigation Support, Investigations and Expert Witness Services Rick Potocek, CPA, MBA, CFE.
NATIONAL COMMUNICATIONS COMMISSION REGULATORY PRACTICES WORKSHOP MODULE: 4 INVESTIGATION.
Fraud and Forensic Auditing Chapter Ten. Definition of Fraud “…any act involving the use of deception to obtain an illegal advantage.” (ISACA Irregularities.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Corporate Fraud Discovery & Prevention. What is Corporate Fraud? May 9, 2013 – AT&T Pays FCC $18.25 Million to Settle IP Relay Fraud Claims November 7,
Professional Values and Basic Business Legislation.
Intrum Justitia Sp. z o.o April 11th RECOVERY OF BAD DEBTS.
© 2012 Experian Information Solutions, Inc. All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian.
Sole Proprietorship. Types of Businesses Sole Proprietorship Partnership Corporation.
Trade Management  Module 4.  Learning Objectives:  Managing receivables  Securing receivables  Sales documentation.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Business Ownership Structures Business Entity. Most Common 1)Sole Proprietorship 2)Partnership 3)Limited Partnership 4)Limited Liability Company (LLC)
Contracts of Employment. This is a legal document which sets out the details of a person’s employment. This is a legal document which sets out the details.
By: Asfa Khan and Huda Mukhtar
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
CH. 17 Class Discussion MANAGING OPERATIONS AND STAFFING.
Computer Forensics Presented By:  Anam Sattar  Anum Ijaz  Tayyaba Shaffqat  Daniyal Qadeer Butt  Usman Rashid.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Business Ownership Structures
Understanding Your Credit Score Central Piedmont Community College TRiO Student Support Services Financial Literacy Series Workshop.
Ratio Analysis…. Types of ratios…  Performance Ratios: Return on capital employed. (Income Statement and Balance Sheet) Gross profit margin (Income Statement)
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
How To Improve Your Credit Score Federally insured by NCUA Great Rates. Personal Service. chevronfcu.org 
Services Overview 1. Guarding your intellectual property from the greatest threats. Insight Accelerator / 2 Screen i/o is a service dedicated to identifying.
Debts Recovery in Romania. INTRODUCTION Recovering a debt can be a complex process everywhere, for every business, regardless of the industry. The Romanian.
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
8 – Protecting Data and Security
Chapter 7. Identifying Assets and Activities to Be Protected
Investigations in Asset Tracing
CPA Gilberto Rivera, VP Compliance and Operational Risk
Credit Management Experts on Russia, Baltic States and Eastern Europe
Presented by (Abdisamad Abdullahi Abdulle)
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Presentation transcript:

AmCham Receivables Management Workshop 11 April 2006 Warsaw Iris Paeschke Consultant Control Risks

Subject What is this presentation about? Focus is not on the legal requirements and procedures. But on operational issues of debt recovery. Especially when the debtor is either insolvent or resides in remote jurisdictions debt recovery becomes problematic in pure practical terms.

Agenda Define the problem Questions and objectives Tools in detail

To cope with the task: define the problem Flash Point You are facing a major problem: substantial losses of assets, e.g. information, goods, money, tender etc. Solution Use your information resources or a consultancy to enlighten the circumstances. Definition Define the problem and narrow the issue down in-house.

A first step to asset recovery is business intelligence –Collect more information on the debtor. Identifying addresses, obtaining rudimentary corporate filings gives you first data you can work with. This work can be done in-house if the creditor has installed a bad debt policy and spent time on training its team. –However, an "easy on bad debt" policy is just as severe as an "easy on corruption" or "easy on fraud" policy. Bad debts have a tendency to become endemic and thus threaten the financial health of a company. What should be done first

Operational objectives: Who is the ultimate beneficary of a company when the debtor 's company shields its assets through shell companies and off-shore entities? Does a company still own some assets although it has filed for insolvency? Are there indications of fraudulent behaviour? Do law-enforcement agencies need to get involved? Tactical objectives: Even if civil litigation against managers of debtor companies might look promising: How realistic is it that these managers do have in fact have assets to pay off the debt? If the debtor asks for a settlement: What is his maximum ability to pay, in contrast to his maximum willingness to pay? Questions arise …

Where the money goes Our experience with asset tracing and asset recovery in Poland, Germany and Eastern Europe show some principle guidelines, how to cope with the practical issues of bad debt collecting: –Bad debts follow similar patterns and bad debtors use similar methods of shielding their assets. –Owners of insolvent companies have a tendency to shield assets prior to the default. These assets are often not very well hidden and can be identified. –If there are any signs of fraud, there is almost always an opportunity to cooperate with law enforcement. This holds true even for remote places and countries. –The costs of collecting have to be monitored carefully. There is no point in chasing potential claims that will never materialise.

Tools in detail Open Sources Research Searching of Files / Workshop IT Forensics Close Questioning / Interviews Special Techniques

Open Sources Research What information do we use? Internet Chat rooms News boards Public Registers Press & Business Databases Other Special Databases

Workshop / Internal Files Mexiko City Los Angeles New York London Berlin Djakarta Melbourne Sydney Shanghai It is important that all files related to the task are included into the inquiries. Internal files, such as Personnel file Reports of internal auditors / lawyer Letters Notes Special information, e.g. Holiday / Sickness list Itemised bill (fixed and cellular) A workshop can reveal other important information, which become useful later on.

Computer Forensics Los Angeles New York London Berlin Djakarta Melbourne Sydney Shanghai What are the targets? Personal Computer Server Network What are we looking for? Hardware Software User Configuration Internet History, server files s (you have to read them all !) Keywords / Documents Pictures

Close Questioning / Interviews Los Angeles New York London Berlin Djakarta Melbourne Sydney Shanghai When most of the information are gathered a close questioning of the suspects is suggestive. Questioning should be done by external experts only. Why? Suspects do not know us. We are trained on questioning. We are not involved in the day to day business.

Special Techniques Los Angeles New York London Berlin Djakarta Melbourne Sydney Shanghai In extraordinary circumstances we use special techniques to retrieve the information. In dependence on the issue, we have a wide range of methods we are able to use. However such methods are Used as ultima ratio only. According to the local jurisdiction.

Dos and Don‘ts Don‘ts: –Don‘t use obscure or illegal methods. –Don‘t seek for revenge. –Don‘t let you put off the problem and do not be frighten. –Don‘t wait too long. Dos: –Structurise and standardise the bad debts collection process. –Your employees should be trained on it. –The process should be initated under any circumstances. –It should be embedded into a legal process, together with the legal department and/or lawyer –Check for fraudulent behaviour. If so: involve internal auditors or external consultants. –At the end: use your cases for preventive measures. Improve your know-your-customer-policy.

Contact Alle hier vorgestellten Ideen und Vorschläge sind geistiges Eigentum der Control Risks Deutschland GmbH und unterliegen dem Urheberrecht. Jede Vervielfältigung im Ganzen oder in Teilen sowie die Weitergabe an Dritte ist nicht gestattet. Für den Fall, daß es nicht zur Auftragsvergabe durch den Partner (Adressaten) kommt, dürfen die hier vorgestellten Ideen und Vorschläge nicht verwendet werden. Control Risks ul. Koszykowa Warszawa T: F: Iris Paeschke Consultant