1 Conducting Investigations and Report Writing Chapter 15.

Slides:



Advertisements
Similar presentations
ISRCL- Young Lawyers Anthony Gett Barrister & Senior Legal Officer Commonwealth Director of Public Prosecutions (Australia)
Advertisements

Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation Witness Interviewing.
Internal Audit Documentation and Working Papers
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Legal Responsibilities for Board Members of Nonprofit Organizations Or…all you need to know to stay out of trouble. Presented: July 2007 Prepared by: Elsbeth.
Evidence Collection & Admissibility Computer Forensics BACS 371.
Protecting Evidence Fire Cause Determination. Fire departments should investigate all fires to determine the cause of the fire. The cause of a fire is.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
6-1 Full and Fair Reporting Electronic Presentation by Douglas Cloud Pepperdine University Chapter F6.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Legal Follow-Up Chapter 18.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Internal Audits, Governmental Audits, and Fraud Examinations
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Fraud Examination, 3E Chapter 8: Investigating Concealment COPYRIGHT © 2009 South-Western, a part of Cengage Learning.
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
Chapter 16 Prepared by Richard J. Campbell Copyright 2011, Wiley and Sons Topics Beyond the Integrated Audit.
INTRODUCTION TO THE LAW OF EVIDENCE
Chapter 2 Modern Private Security
Presented by Steven Russo, Chief of Investigations September 19, 2012 The State Auditor’s Whistleblower Program.
Internal Auditing and Outsourcing
D-1 McGraw-Hill/Irwin ©2005 by the McGraw-Hill Companies, Inc. All rights reserved. Module D Internal, Governmental, and Fraud Audits “I predict that audit.
Considering Internal Control
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Evidence and Documentation
Copyright © Education Compliance Group, Inc. All rights reserved. By Peggy A. Burns, Esq. and Mark Hinson, SPHR Internal Investigations & Decision-Making:
Computer Forensics Principles and Practices
PREVENTIVE LAW WORKSHOP Investigating Employee Misconduct Mary Elizabeth Kurz, Vice Chancellor and General Counsel Dianne Sortini, Director, Employee Relations.
Lecture 11: Law and Ethics
STATE OF ARIZONA BOARD OF CHIROPRACTIC EXAMINERS Mission Statement The mission of the Board of Chiropractic Examiners is to protect the health, welfare,
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Criminal Investigation: An Overview
Legal aspects of forensics. Civil Law private law ◦ Regulates noncriminal relationships between individuals, businesses, agency of government, and other.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Fool me twice… Shame on Me Metro Toronto Convention Centre February 2, 2010.
Detention and Questioning under PACE When a suspect is arrested the basic procedure is that they should be taken as soon as practicable to a designated*
Audit Evidence Process
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
©2012 Prentice Hall Business Publishing, Auditing 14/e, Arens/Elder/Beasley Section 404 Audits of Internal Control and Control Risk Chapter.
Chapter 8: Investigating Concealment © 2016 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Chapter 3-Auditing Computer-based Information Systems.
Zimbelman, Albrecht, Albrecht, Albrecht © 2012 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
©©2012 Pearson Education, Auditing 14/e, Arens/Elder/Beasley Considering Internal Control Chapter 10.
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. Chapter
Improving Compliance with ISAs Presenters: Al Johnson & Pat Hayle.
McGraw-Hill/Irwin © The McGraw-Hill Companies 2010 Internal Control in a Financial Statement Audit Chapter Six.
Juvenile Legislative Update 2013 Confidentiality of Records and Interagency Sharing of Educational Records.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Outline of the U.S. and Arizona Criminal Justice Systems
Criminal Evidence Chapter 3
All rights Reserved Cengage/NGL/South-Western © 2016.
Chapter 3: Fighting Fraud: An Overview
The Law Governing Identification Evidence
Fraud Examination Chapter 8
TIPS FOR IMPROVING THE EFFECTIVENESS OF YOUR DEPOSITIONS
Chapter 17 Videotapes Photographs Documents Writings.
Class Name, Instructor Name
Chapter 13: The IT Professional
EVIDENCE, DOCUMENTATION, AND AUDIT PROGRAMS
Introduction to Digital Forensics
State of florida tax information sharing Paula Barfield August 5, 2015
Presentation transcript:

1 Conducting Investigations and Report Writing Chapter 15

2 Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination team. Define evidence. Be familiar with several evidence gathering techniques. Learning Objectives

3 Understand the considerations and concerns related to preserving documentary evidence. Understand the importance of and methods for organizing documentary evidence. Identify several sources of evidence and the types of information each can provide. Be familiar with the standard format and requirements for a professional investigation report. Learning Objectives

4 Reasons to Investigate To determine source of losses To identify the perpetrator(s) To gather evidence To recoup losses To identify control weaknesses To comply with laws and regulations –Federal statutes –SEC regulations

5 Reasons to Investigate To avoid violating required duties of officers and directors –Loyalty –Reasonable care To avoid discrimination charges from employee dismissal To mitigate company liability for employee misconduct and reduce fines under Corporate Sentencing Guidelines

6 Planning the Investigation Who will be involved in the investigation? What will be the investigation strategy?

7 The Investigation Team Include only those individuals who: –Can legitimately assist in the investigation –Have a genuine interest in the outcome of the investigation Primary goal is to resolve fraud allegations as thoroughly and efficiently as possible

8 The Investigation Team Certified Fraud Examiners Legal counsel Internal auditors Security personnel IT and computer forensics experts Human resources personnel A management representative Outside consultants

9 Evidence Anything perceivable by the five senses Any proof that is legally presented at trial to prove a contention and induce a belief in the minds of a jury –Testimony of witnesses –Records and documents –Facts and data –Tangible objects

10 Obtaining Evidence Covert operations Surveillance Using informants “Dumpster diving” Subpoenas Search warrants Voluntary consent

11 Covert Operations Investigator assumes a fictitious identity Requires high degree of planning and skill –Objectives –Time frames –Approvals Legal if there is sufficient probable cause that a crime has been committed

12 Pretexting Obtaining information through falsehood or deception –Example: Calling suspect’s relative and pretending to be old friend looking for contact information Not always legal

13 Surveillance Secretive and continuous observance of a suspect’s activities to: –Obtain probable cause for search warrants –Develop investigative leads –Identify co-conspirators –Gather intelligence –Locate persons and things relevant to the investigation

14 “Dumpster Diving” Sifting through suspect’s trash to obtain evidence Can be done without search warrant, provided trash has left suspect’s possession –No reasonable expectation of privacy

15 Handling Evidence To be admissible in court, evidence must be preserved and handled correctly. –Properly identified –Chain of custody maintained –Proven relevant and material to case Obtain original documents when feasible. Do not touch originals any more than necessary. Maintain a good filing system.

16 Chain of Custody Record of when item is received or when it leaves the care, custody, or control of the fraud examiner Best recorded in memorandum stating: –What items were received –When they were received –From whom they were received –Where they are maintained

17 Preserving Evidence Documents should be marked for later identification; however, never mark on original documents other than unobtrusive initials or tick marks made for identification. Do not fold, staple, paper clip, or otherwise change original document. Use gloves when handling documentary evidence to avoid leaving fingerprints.

18 Organizing Evidence Segregate documents either by witness or by transaction. Make a “key document” file. Establish a database early on in the investigation. Create chronology of events. Use and frequently update to-do lists. Use computer software to organize documents and data.

19 Sources of Information Fraud examiners may need to search for specific information to help in: –Locating individuals or verifying their identities –Researching assets or financial positions –Documenting lifestyles and background information –Discovering banking/creditor relationships –Identifying business affiliations/associates –Uncovering litigation history

20 In-house Sources Investigators can learn a great deal from internal documents and information at the suspect’s organization. –Personnel files –Internal phone records and voice mail –Computer files and records –Physical files and records –Timesheets –Financial records –Prior audit or investigative files –Corporate policies and procedures –Company communications to employees –Access codes and user identification codes –Security videos

21 Public Information Records that a governmental unit is required by law to keep or those which are necessary for a governmental unit to keep in order to discharge its duties imposed by law Different information is kept by different governmental levels and agencies

22 Local/County Records Voter registration records Marriage license records Real property records Property tax records Health and fire departments Sheriff/county prosecutor County fire marshal Utility company records Permits

23 State Records Business filings –Articles of incorporation –Fictitious names/DBA registrations Uniform Commercial Code filings Employee/labor records Workers’ compensation information State tax filings Professional associations/licensing boards

24 Court Records Litigation history Divorces Personal injury suits Financial suits Bankruptcy records Probate records

25 Online Searches Commercial online services provide convenient access to a wide range of data in a single place. Accessing information online is never a full substitute for an actual examination of public records. Fraud examiners should not rely on information from public websites without verifying its authenticity and accuracy.

26 Report Writing Fraud examinations conclude with a report of the investigation results. Usually a formal written report Normally used for internal purposes, but may be sent to police or insurance companies Other than technical matters, no opinions of any kind—particularly those regarding guilt or innocence—should be included in report.

27 Investigation Report Report must be accurate and understandable, and must “speak for itself” A good report: –Conveys evidence –Adds credibility –Accomplishes objectives of the case –Is written with the expected reader(s) of the report in mind

28 Investigation Report Report should be written as though it will be used in civil or criminal trial. State only the facts. Do not make errors. Include a follow-up section.

29 Format of Report Author/Date Summary Introduction/Purpose Body Results Follow-up/Recommendations