economic crime studies online learning

Size: px
Start display at page:

Download "economic crime studies online learning"

Transcription

1 economic crime studies online learning British Columbia Institute of Technology advanced specialty certificate part-time studies bcitforensics.ca

2 applicant s handbook economic crime studies online learning advanced specialty certificate part-time studies Fraud is not an accounting problem; it is a social phenomenon. Joseph T. Wells, founder of the Association of Certified Fraud Examiners Contents Overview Online Learning Career Opportunities Course Descriptions Contact Information bcitforensics.ca 1

3 economic crime studies internet based studies Overview The economic and social costs of fraud and other economic crime are growing at an alarming rate: >>The typical Canadian organization loses 5 percent of its annual revenue to fraud every year. When the Bre-X scandal broke, the Quebec public-sector pension fund lost $70 million, the Ontario Teachers Pension Plan lost $100 million, and the Ontario Municipal Employees Retirement Board lost $45 million. >>Financial crime is becoming the chief fundraising method for organized crime and terrorist organizations. >>The prevalence of economic crime causes significant increased risk of economic, social, and political instability to Canada and the rest of the world. BCIT s Centre for Forensic and Security Technology Studies offers courses designed to provide qualified professionals with both the theoretical knowledge and the hands-on skills required to prevent, detect, investigate, and prosecute all types of economic crime. Online Learning The Centre for Forensic and Security Technology Studies offers a select number of courses online, enabling greater flexibility for students outside of the Greater Vancouver area, throughout Canada and internationally. You will learn at your own pace and need not commit to a specific block of time every week to attend classes. The online learning experience is interactive, and you will obtain the full benefits of regular online contact with instructors and with fellow students. Instructional materials are clear and easy to navigate through, and our instructors are available at any time to answer questions and provide guidance. Career Opportunities BCIT courses are intended to provide the skills and knowledge that professionals require to work successfully in the prevention, detection, and investigation of commercial crime. There is a growing requirement for professionals in these fields in both the private and public sectors. Sample position titles include: >>Police detective >>Provincial investigator >>Investment analyst >>Insurance investigator (Special Investigations Unit) >>Manager, corporate security >>Network security manager >>Risk manager >>Internal auditor >>Loss claims investigator >>Forensic accountant >>Securities investigator >>Private security or investigations practitioner 2 british columbia institute of technology

4 applicant s handbook Course Descriptions Introduction to Commercial Crimes in Canada FSCT 7210 This course provides an introduction to commercial crimes in Canada. Three main issues are considered: >>theory the criminal code section and the fundamental legal principles underlying the offence; >>practical criteria identifying the priority elements of proof that are required from a practical point of view >>satisfying the criteria reviewing the usual types of evidence required to prove the offence. Primary commercial crimes considered include: fraud, theft, counterfeit currency, credit and debit card offences, internet based frauds, conspiracy, and money laundering. Other topics include: stock market manipulation and other securities related offences, criminal breach of trust, customs and excise offences, secret commissions, planned bankruptcy, and possession of goods obtained by crime. Reference is made to various industry issues such as banking regulations and their impact on the offences being studied. 21st century issues such as the global economy, telemarketing, the cable industry and gaming are also discussed. >>Identify and discuss the theoretical aspects of enumerated criminal code offences, including the fundamental underlying legal principles >>Identify the practical criteria required to prove all elements of the offences as set out in legislation >>Apply the theoretical knowledge in case-study and practical problem situations >>Given a specified fact situation, prepare an investigative plan, setting out the investigative objective to be attained by each step in the plan >>Demonstrate the ability to conduct effective fraud related research from appropriate websites and course materials Forensic Interviewing for Investigators fsct 7231 The success of any investigation at any level is dependent on the investigator obtaining evidence and presenting it in a manner that is acceptable to the courts. Often this evidence is information supplied by people involved in the incidents. The amount and veracity of this information is very important. In this course, you will learn and practice methods and techniques available for interviewing victims, witnesses and suspects in order to obtain proper, informative and legal statements that will both aid in the investigation and are acceptable to the courts. >>Apply communication principles to the interview process >>Interpret verbal and non-verbal responses in a practical application >>Using practical examples, explain how to overcome errors in recalling an incident >>Conduct a cognitive interview using the principles learned >>Assess the fact situation underlying a scheduled interview and demonstrate the ability to plan properly >>Question a subject using proper question formulation, timing and delivery in a practical application >>Conduct the step-by-step procedure of a behaviour analysis interview in a practical application >>Take a formal written statement in a practical application >>Evaluate the veracity of a written statement using the principles learned >>Assess a given fact situation to determine how current case law could affect the admissibility of a statement in court >>Conduct a forensic interview using the methods and techniques learned bcitforensics.ca 3

5 economic crime studies internet based studies Investigation of Securities Crimes fsct 8421 This course introduces various Criminal Code and Securities Act infractions particular to the Canadian securities markets, and to the techniques used by the financial crimes investigator to identify, investigate, and prosecute these offences. >>Describe the basis for and components of securities regulation in Canada >>Describe, compare, and contrast the different approaches to securities regulation in Canada >>Describe common securities law offences and the consequences for offenders Given a particular set of facts: >>Assess the facts from a regulatory perspective >>Identify specific securities law and criminal code offences that may be indicated >>Justify the issuance of an investigation order >>Select an appropriate approach to investigating the alleged offences >>Use government, police and private sources of information to assist in the investigation of offences >>Conduct and develop appropriate lines of questioning and specific questions to elicit the desired relevant information during interviews of witnesses, some of whom may be uncooperative >>Prepare investigative documents, such as demands, summons, evidence log, search warrants and production orders >>Prepare investigation reports to assist in the prosecution of offenders Tactical Analysis fsct 8430 This course focuses on the various duties performed by tactical analysts in law enforcement. You will learn the five stages of the analysis cycle and complete a variety of assignments and tasks associated to each of those stages. To complete the tasks, you will use word processing and charting software programs. The majority of the course will focus on your ability to collate and analyze the information provided. You will then develop your analytical skills in order to effectively target and profile deviant and criminal individuals and groups. You will use your analytical skills to develop logically sound arguments for a variety of law enforcement actions. >>Define analysis and describe the organizational role of analysts >>Describe current trends in analysis >>Develop an analytical plan >>Apply processes for collecting information >>Apply procedures for assessing reliability of service and worth of information >>Assemble investigators data in a format to clearly profile subject(s) activities >>Describe methods and tools used to generate conclusions about the material >>Communicate findings using a variety of communication tools 4 british columbia institute of technology

6 applicant s handbook Forensic Accounting 1 fsct 8440 You will receive basic training using forensic accounting tools and techniques necessary to develop and report financial information regarding criminal investigations. Topics such as expert independence, information sources, rules of documentary evidence, and financial interviewing are covered, as well as forensic accounting approaches to investigating a number of specific criminal offences. >>Explain pre-acceptance considerations for forensic accounting engagements >>Analyze and interpret the results of a forensic accounting investigation >>Communicate the findings of an expert forensic accounting investigation in a way that will be understood by the parties and by the trier of fact >>Apply legal rules for handling and presenting financial and accounting evidence >>Plan for and carry out the gathering of evidence from different sources in support of a forensic accounting investigation >>Plan for and carry out a financial interview >>Trace funds directly and indirectly, and explain the strengths and weaknesses of both tracing methods >>Discuss common characteristics and legal elements of frauds including corruption, arson, bankruptcy fraud, money laundering, and management frauds >>Apply common investigative and audit techniques available to a forensic accountant to assist in the investigation of each of the above frauds Forensic Accounting 2 fsct 8460 Building upon investigative techniques learned in Forensic Accounting I, this course provides you with a knowledge of specific types of commercial fraud and abuse, including asset misappropriation, falsified statements, corruption, and conflict of interest. Characteristics of each type of abuse, as well as indicators, detection, and prevention, will be covered. Specialized topics, such as anti-competitive offences, risks involved in foreign operations, due diligence requirements, and anti-money-laundering and antiterrorism legislation are also canvassed. Topics of particular interest to investigators are the use of computers in the detection of fraud, the conduct of internal (corporate) investigations, and the remedies available to organizations that have been victimized by commercial crime. The orientation of the course will be toward those individuals who have responsibility for the prevention, detection, and investigation of commercial crime in either the corporate or private-sector context. It will be of particular interest to those of you who are employed, or who may be considering a career in the private sector such as security, internal audit, quality control, or risk management. >>Apply internal control principles to assess the strengths and weaknesses of an organization s control systems and to recommend and justify appropriate remedial actions >>Given a specific fact situation, design a system of internal controls for the purpose of preventing, detecting, and recovering from fraud >>Describe, with relevant examples, various types of corporate fraud, asset misappropriation, fraudulent statements other than financial statements and corruption >>Assess a given fact situation to determine whether indicators of fraud exist >>Develop an appropriate plan of action for investigating an incident of suspected fraud bcitforensics.ca 5

7 economic crime studies internet based studies >>Interpret given fact situations to determine whether there may be corporate liability for failure to exercise due diligence under specified legislation, including: >>The Proceeds of Crime (Money Laundering) and Terrorist Financing Act >>The Corruption of Foreign Public Officials Act >>Reporting requirements under the Antiterrorism Act >>Selected offences under the Competition Act >>In a given fact situation, construct a corporate compliance regime that will satisfy the due diligence requirements of various pieces of legislation >>Explain the concept of due diligence in its application to civil liability and litigation >>Evaluate the potential for the use of computer-assisted audit techniques, critical-point auditing, and numerical and digital analysis to detect various types of fraud >>Give simple, non-technical explanation of various numerical analysis techniques and their application in fraud detection >>List the factors that distinguish internal investigations from criminal investigations >>Define and distinguish various types of civil orders (Anton Piller orders, Mareva injunctions, and Norwich Pharmacal orders) >>Discuss, in general terms, the use of the various types of orders in the civil recovery context >>Evaluate a given fact situation to determine whether, and against whom, civil remedies may lie >>Assess a given fact situation to determine what remedies in tort and in contract may be appropriate Forensic Data Analysis fsct 8490 Forensic data analysis involves the examination of organizational data to identify patterns that match known fraud profiles. The patterns sought may be logical (e.g. vendors having the same mailing address as employees) and numerical and statistical (e.g. duplications of specific digits, digit patterns and combinations, specific numbers, and round numbers) patterns in corporate data. 6 british columbia institute of technology Forensic data analysis also involves the use of neural-net and other data mining technologies to gain knowledge regarding databases and to develop models for fraud detection, prediction, and prevention where known fraud patterns are lacking or obscure. Upon completing this course, you will be able to develop a fraud scenario, translate this scenario into a fraud profile, and apply appropriate detective tests to a corporate database. You will be given the opportunity to employ proprietary computer-assisted audit software and data-mining software to practice databases for the purpose of applying learned skills. >>Analyze a given fact situation for the purpose of identifying appropriate data sources to accomplish specified investigative goals >>Develop a plan and procedures for cleaning and preprocessing required to prepare data for analysis >>In a given fact situation, develop and justify a plan of action to address concerns regarding the admissibility and weight of electronic-source evidence > >Apply ACL commands to given input data definition files for the purpose of performing simple rule-based tests >>Determine the appropriate rule-based tests to apply to a set of data for the purpose of achieving a specified investigative goal >>Assess a given fact situation and determine the appropriate digital-analysis test to apply to investigate for fraud >>Interpret patterns in the findings of tests conducted, with particular reference to indicators of fraud and misstatement >>Develop and justify a plan for following up on leads generated >>State, in simple terms, the theory behind basic techniques of bankruptcy forecasting >>Apply a given model bankruptcy-prediction to a simple set of financial statements >>Discuss basic concepts of data mining, particularly in fraudrelated applications >>Apply data-mining concepts to a database of ATM transactions to produce a simple fraud-detection model, using Computer Associates CleverPath Predictive Analysis Server

8 applicant s handbook Fraudulent Financial Statements fsct 8491 Beginning with coverage of the environment in which financial statement fraud occurs, you will learn how to use financial statements and other disclosures for the purpose of assessing the quality of financial reporting and identifying potential signals of manipulation. You will then proceed to cover more complex issues, including business combinations, executive compensation and employee benefits, and the use and misuse of derivatives and special-purpose entities. >>Explain the use and importance of the information that may be found in financial reports and other information sources, in detecting financial statement fraud >>Evaluate a comprehensive financial report, including financial statements and other open-source information, to determine whether it reflects the characteristics that distinguish low-quality from high-quality earnings >>Develop an earnings-management detection strategy >>Analyze a balance sheet using horizontal, vertical, and ratio analysis, as well as by applying detailed analysis to line-items for the purpose of detecting manipulation of assets, liabilities, and earnings >>Analyze an income statement, using high-level and detailed approaches, for evidence of misstatement of revenues and expenses >>Analyze cash flow statements for the purpose of detecting misstatements and mis-categorizations >>Analyze a set of financial statements, using discriminant models such as the Beneish M-score and the Altman Z scores, to determine whether there are indicators of earnings manipulation or other misrepresentation >>Compare and contrast alternative measures of profitability and of cash flow, with emphasis on the relative quality of information that each conveys >>Scrutinize financial reports for indicators of fraudulent reporting by analysis of trend, norm, and quarterly data >>Evaluate the likelihood of earnings management or other financial statement manipulation in situations involving business combinations, segmented reporting, employee compensation and benefits, derivatives, and special-purpose entities Internet for Investigations fsct 8520 The Internet consists of about ten billion pages of information, yet many investigators and analysts make only superficial use of this amazing resource. This course was designed for those who need to search more aggressively and use information more carefully than the general public. The intention of this course is to turn those who already have some computer and Internet experience into power users of the Internet and to reveal how the Internet can augment their traditional investigative methodology. It covers not only technical issues, but also includes how to formulate good search strategies and mine the invisible web. You develop and refine your search skills in the first half of the course. The second half introduces tools and techniques to make searchers more efficient, effective, and secure. The course concludes with module on cybercrime. >>Obtain open source information through the Internet relevant to investigations >>Trace websites and >>Protect your identity and the integrity of your systems and data while on-line >>Utilize a selective list of hundreds of high-value web sites relevant to investigators >>Assess information obtained via the Internet for accuracy and bias >>Wrest full value from open source information through media analysis >>Profile individuals from their blogs, newsgroup postings and messages >>Conduct limited searching of commercial on-line databases bcitforensics.ca 7

9 economic crime studies internet based studies >>Use link diagrams and other techniques to organize and analyze the information retrieved >>Understand how both criminals and law enforcement are using the Internet Asset Recovery fsct 8945 The recovery of misappropriated assets, or obtaining equivalent restitution, closes the circle of the fraud investigation process. After completing this course you will be able to list and describe the options available for this purpose, including criminal prosecution, insurance recovery, and civil litigation. You will also be able to discuss the circumstances in which each option would and would not be appropriate, and the advantages and disadvantages of each option. Finally, you will be able to identify the range of professional expertise required to effect asset recovery in local, national, and transnational fact situations. >>Discuss the options and remedies for asset recovery >>Determine cost and benefit factors considered in locating and recovering assets >>Discuss sources of information used to locate assets >>Plan a strategy for asset recovery considering location and legal jurisdictions >>Document and demonstrate the link of a located asset to the fraud Contact Information Program Office Centre for Forensic and Security Technology Studies British Columbia Institute of Technology 3700 Willingdon Avenue Burnaby, BC V5G 3H2 T F W bcitforensics.ca Program Coordinator Stephen Hollander, CGA, CFE Economic Crime Studies and Forensic Investigative Accounting Options T E Stephen_Hollander@bcit.ca 8 british columbia institute of technology

10 british columbia institute of technology 3700 willingdon ave burnaby, british columbia canada v5g 3h2 bcit.ca april 2008, mcd 5411

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Diploma in Forensic Accounting (Level 4) Course Structure & Contents Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

These jobs are posted in accordance with the CUPE 3902 Unit 3 Collective Agreement

These jobs are posted in accordance with the CUPE 3902 Unit 3 Collective Agreement DIPLOMA IN INVESTIGATIVE & FORENSIC ACCOUNTING PROGRAM University of Toronto Mississauga SESSIONAL INSTRUCTIONAL ASSISTANT S CUPE 3902, UNIT 3 SUMMER/FALL/WINTER 2013- These jobs are posted in accordance

More information

PROVINCE OF BRITISH COLUMBIA. Summary Review. Anti-Money Laundering Measures at BC Gaming Facilities

PROVINCE OF BRITISH COLUMBIA. Summary Review. Anti-Money Laundering Measures at BC Gaming Facilities PROVINCE OF BRITISH COLUMBIA Summary Review Anti-Money Laundering Measures at BC Gaming Facilities February 2011 2 P a g e EXECUTIVE SUMMARY In early January 2011, a series of news reports ran on cash

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-7 Service : Crime Service Position

More information

South Australia Police POSITION INFORMATION DOCUMENT

South Australia Police POSITION INFORMATION DOCUMENT South Australia Police POSITION INFORMATION DOCUMENT Stream : Administrative Services Career Group : Financial Related Discipline : Financial Services Classification : ASO-6 Service : Crime Service Position

More information

THE PROPOSED CANADIAN SECURITIES ACT: CRIMINALIZING SECURITIES REGULATION IN CANADA. James D.G. Douglas November 22, 2010

THE PROPOSED CANADIAN SECURITIES ACT: CRIMINALIZING SECURITIES REGULATION IN CANADA. James D.G. Douglas November 22, 2010 THE PROPOSED CANADIAN SECURITIES ACT: CRIMINALIZING SECURITIES REGULATION IN CANADA James D.G. Douglas November 22, 2010 The Traditional Emphasis of Securities Regulation in Canada Has Been Regulatory

More information

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better.

BDO NORDIC. Investigation, fraud prevention and computer forensics. You can guess. You can assume. Or you can know. And knowing is always better. BDO NORDIC Investigation, fraud prevention and computer forensics You can guess. You can assume. Or you can know. And knowing is always better. CONTENT OUR SERVICES 3 Investigation - Identifying the facts

More information

Fraud-Related Compliance

Fraud-Related Compliance Fraud-Related Compliance Investigating and Reporting 2015 Association of Certified Fraud Examiners, Inc. Investigations, Reporting, and Compliance Investigations benefit victim organizations by: Recovering

More information

Lawyer: Alternative Careers. A guide for newcomers to British Columbia

Lawyer: Alternative Careers. A guide for newcomers to British Columbia A guide for newcomers to British Columbia Lawyer: Alternative Careers In BC, lawyers advise clients on legal matters, draft legal documents and represent clients before courts, tribunals and administrative

More information

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial

More information

1. The Application Process

1. The Application Process Criteria for Approving New Mortgage Associate Education Programs and Mortgage Brokerage Education Programs under The Mortgage Brokerages and Mortgage Administrators Act (the Criteria ) The Saskatchewan

More information

Commonwealth Fraud Control Guidelines Annual Reporting Questionnaire 2009-10

Commonwealth Fraud Control Guidelines Annual Reporting Questionnaire 2009-10 Commonwealth Fraud Control Guidelines Annual Reporting Questionnaire 2009-10 Please read this first In accordance with the Commonwealth Fraud Control Guidelines (the Guidelines) issued under Regulation

More information

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview

JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview JIBC Intelligence Analysis and Tactical Criminal Analysis Graduate Certificate Program Overview Each graduate certificate program consists of five courses which are delivered entirely online in sequential

More information

Appendix A DRAFT INFORMATION MANAGEMENT PLAN

Appendix A DRAFT INFORMATION MANAGEMENT PLAN 1 Appendix A DRAFT INFORMATION MANAGEMENT PLAN Pacific Region Identity Protection Project PRIPP April 2004 Forum Eyes Only 2 ABBREVIATIONS Throughout this report the following abbreviations will be utilised:

More information

Forensic Audit Building a World Class Program

Forensic Audit Building a World Class Program Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students

Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NIJ Special Report Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NOTE: The following is based on an exposure

More information

FAQs Organised Crime and Anti-corruption Legislation Bill

FAQs Organised Crime and Anti-corruption Legislation Bill FAQs Organised Crime and Anti-corruption Legislation Bill What is organised crime? Organised crime normally refers to an organisation of criminals who engage in illegal activity on a large, centralised

More information

Office of Personnel Management. Policy Policy Number: Definitions. Communicate: To give a verbal or written report to an appropriate authority.

Office of Personnel Management. Policy Policy Number: Definitions. Communicate: To give a verbal or written report to an appropriate authority. Citation: Arkansas Code Annotated 21-1-601 through 608, 21-1-610; 21-1-123 and 124 Office of Personnel Management Policy 1 Forms: Fraud Reporting Complaint Form Definitions Adverse action: To discharge,

More information

COMPLAINTS IN RETIREMENT HOMES

COMPLAINTS IN RETIREMENT HOMES COMPLAINTS IN RETIREMENT HOMES This article was originally published in ACE s Spring/Summer 2013 Newsletter which is available at www.acelaw.ca Conflicts may arise in any type of housing. Retirement homes

More information

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception

More information

Safeguarding Your Financial Assets & Mitigating Employee Fraud. Why Employee Fraud is Difficult to Quantify? What is Fraud?

Safeguarding Your Financial Assets & Mitigating Employee Fraud. Why Employee Fraud is Difficult to Quantify? What is Fraud? What is Fraud? Safeguarding Your Financial Assets & Mitigating Employee Fraud Wikipedia In criminal law, a fraud is an intentional deception made for personal gain or to damage another individual; the

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such

More information

Department, Board, Or Commission Author Bill Number

Department, Board, Or Commission Author Bill Number BILL ANALYSIS Department, Board, Or Commission Author Bill Number Franchise Tax Board Leno SB 467 SUBJECT Privacy/Electronic Communication/Warrants SUMMARY The bill would require the department to obtain

More information

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF

A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF A FRAUD EXAMINATION COURSE: PREPARATION FOR THE INTERNATIONAL CFE EXAMINATION (EQUIVALENT TO THE ADVANCE CERTIFICATE FRAUD EXAMINATION: SAQA NQF 6) Course 1: 12-16 March 2012 and 26-30 March 2012 Course

More information

Audit Quality Thematic Review

Audit Quality Thematic Review Thematic Review Professional discipline Financial Reporting Council January 2014 Audit Quality Thematic Review Fraud risks and laws and regulations The FRC is responsible for promoting high quality corporate

More information

Financial Analyst. Financial Analyst

Financial Analyst. Financial Analyst Financial Analyst It s about you Do numbers talk to you and tell you a story? Do you enjoy researching, synthesizing and modeling financial data and finding trends? If you thrive under pressure and enjoy

More information

WHISTLE BLOWING POLICY & PROCEDURES

WHISTLE BLOWING POLICY & PROCEDURES Management Circular No: GCSL/01.2013 Revised: 01/2014 WHISTLE BLOWING POLICY & PROCEDURES All rights reserved. No part contained in this Policy may be reproduced or copied in any form without the written

More information

Lockton Financial Advisors, LLC/ Lockton Investment Advisors, LLC

Lockton Financial Advisors, LLC/ Lockton Investment Advisors, LLC SAMUEL A. HENSON J.D., CEBS, RPA, GBA Senior ERISA Counsel shenson@lockton.com Lockton Financial Advisors, LLC/ Professional Profile Sam serves as Senior ERISA Counsel for Lockton Financial Advisors, LLC,

More information

Policy-Standard heading. Fraud and Corruption Policy

Policy-Standard heading. Fraud and Corruption Policy Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code

More information

Forensic Accounting: Relevance In Corporate Governance

Forensic Accounting: Relevance In Corporate Governance Forensic Accounting: Relevance In Corporate Governance Govind Teju Rathod Vishakha s. Gavali Head MBA Program, BIGCE, Assistant Professor, BIGCE, Faculty of Management Studies, Solapur. Faculty of Management

More information

COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY

COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY December 2014 1 Contents Section Page Council Tax Reduction, Discount & Exemption Anti-Fraud Policy 1 Introduction 3 2 Definition of Council

More information

SANCTIONS AND REDRESS

SANCTIONS AND REDRESS Appendix 3 SANCTIONS AND REDRESS Introduction This Appendix sets out s (the Trust / NTW) approach in respect of sanctions to be applied against those persons and / or organisations who have committed fraud,

More information

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview

More information

WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT

WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT WESTERN ASSET MORTGAGE CAPITAL CORPORATION CODE OF CONDUCT I. Introduction This Code of Conduct (the "Code") sets out basic principles to guide the day-today business activities of directors, officers

More information

Big Data s Big Impact In Financial Investigations

Big Data s Big Impact In Financial Investigations Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Big Data s Big Impact In Financial Investigations

More information

Whistleblower. Category: Governance Number: Audience: All University Employees and Board of Governors Issued: February 10, 2014

Whistleblower. Category: Governance Number: Audience: All University Employees and Board of Governors Issued: February 10, 2014 Whistleblower Category: Governance Number: Audience: All University Employees and Board of Governors Issued: February 10, 2014 Owner: President Approved by: Board of Governors Contact: Secretary to the

More information

Forensic Services. kpmg.hu

Forensic Services. kpmg.hu Forensic Services kpmg.hu We help you curb your losses. Our forensic team provides services designed to assist you in matters of a commercial or financial nature that may result in a legal or regulatory

More information

How To Get A Computer Hacking Program

How To Get A Computer Hacking Program CHFI v8(computer Hacking Forensics Investigator) Course Description & Overview Overview CHFIv8 Course Description EC-Council releases the brand new Version 8 of the Computer Hacking Forensics Investigator

More information

MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS

MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS MASTER OF JURISPRUDENCE AND GRADUATE CERTIFICATE PROGRAMS COURSE DESCRIPTIONS MJ 726: AGENCY REGULATIONS Elective (2 credit hours) This course studies the law governing administrative agencies in the task

More information

Leonard W. Vona, CPA, CFE

Leonard W. Vona, CPA, CFE Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: lwvcfe@aol.com Part of an auditor s job is

More information

Deloitte Forensic Fraud Risk Management

Deloitte Forensic Fraud Risk Management Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility

More information

DIRECTORS AND OFFICERS LIABILITY INSURANCE INCLUDING CORPORATE INDEMNITY POLICY APPLICATION PROFIT CORPORATIONS

DIRECTORS AND OFFICERS LIABILITY INSURANCE INCLUDING CORPORATE INDEMNITY POLICY APPLICATION PROFIT CORPORATIONS DIRECTORS AND OFFICERS LIABILITY INSURANCE INCLUDING CORPORATE INDEMNITY POLICY APPLICATION PROFIT CORPORATIONS THIS IS AN APPLICATION FOR A CLAIMS MADE POLICY WITH DEFENCE COSTS INCLUDED IN THE LIMIT

More information

Managing General Agents (MGAs) Guideline

Managing General Agents (MGAs) Guideline Managing General Agents (MGAs) Guideline JUNE 2013 DRAFT FOR COMMENT BC AUTHORIZED LIFE INSURERS www.fic.gov.bc.ca PURPOSE This draft guideline outlines best practices that the Financial Institutions Commission

More information

MASTER IN ACCOUNTING PROGRAM CURRICULUM CORE BUSINESS COURSES (6 COURSES 18 CREDITS) MANAGERIAL ACCOUNTING AND CONTROL TRACK

MASTER IN ACCOUNTING PROGRAM CURRICULUM CORE BUSINESS COURSES (6 COURSES 18 CREDITS) MANAGERIAL ACCOUNTING AND CONTROL TRACK COMPOSITION OF COURSES REQUIRED: MASTER IN ACCOUNTING PROGRAM CURRICULUM CORE BUSINESS COURSES (6 COURSES 18 CREDITS) FINANCIAL ACCOUNTING AND ASSURANCE TRACK MANAGERIAL ACCOUNTING AND CONTROL TRACK TEACHING

More information

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care

More information

Stages of the Audit Process

Stages of the Audit Process Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance

More information

Chapter 15. Conducting Investigations and Report Writing

Chapter 15. Conducting Investigations and Report Writing Chapter 15 Conducting Investigations and Report Writing 1 Learning Objectives Understand the circumstances that may necessitate an internal investigation. Identify who should be part of a fraud examination

More information

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing

More information

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law.

We will not collect, use or disclose your personal information without your consent, except where required or permitted by law. HSBC Privacy Notice HSBC's Privacy Principles HSBC Bank Canada is a subsidiary of HSBC Holdings plc which, together with its subsidiaries and affiliates, is one of the world s largest banking and financial

More information

SAMPLE BACKGROUND CHECK POLICY CANADA

SAMPLE BACKGROUND CHECK POLICY CANADA SAMPLE BACKGROUND CHECK POLICY CANADA 1 CONTENTS: 1. Purpose... 2 2. Scope... 2 3. Background Check Vendor... 2 4. Notice to Applicants and Employees... 2 5. Informed Consent... 2 6. Required Background

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

Vincent Massey High School Law 40S Course Outline 2014-2015

Vincent Massey High School Law 40S Course Outline 2014-2015 Vincent Massey High School Law 40S Course Outline 2014-2015 Course Title: Law 40S School Year and Semester: 2014-2015 Teacher: Ray McLachlan Mclachlan.ray@bsd.ca Course Description: The course includes

More information

YOUR GUIDE TO UNDERSTANDING FINANCIAL STATEMENTS

YOUR GUIDE TO UNDERSTANDING FINANCIAL STATEMENTS YOUR GUIDE TO UNDERSTANDING FINANCIAL STATEMENTS WE SEE MORE THAN NUMBERS In an audit engagement, the Certified General Accountant provides an Independent Auditor s Report. The report provides reasonable

More information

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION

GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION GOOD PRACTICE GUIDELINES FOR INSURANCE INVESTIGATION 6 March 2014 1 Good practice guidelines for insurance investigation Table of contents 1 Purpose of insurance investigation... 2 2 Investigating staff...

More information

ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.]

ACT. [Long title substituted by s. 27 (1) of Act 33 of 2004.] FINANCIAL INTELLIGENCE CENTRE ACT 38 OF 2001 [ASSENTED TO 28 NOVEMBER 2001] [DATE OF COMMENCEMENT: 1 FEBRUARY 2002] (Unless otherwise indicated) (English text signed by the President) as amended by Protection

More information

DIPLOMA IN FORENSIC ACCOUNTING SYLLABUS. Background information to the modules

DIPLOMA IN FORENSIC ACCOUNTING SYLLABUS. Background information to the modules DIPLOMA IN FORENSIC ACCOUNTING SYLLABUS Background information to the modules Background to Module 1 DIPLOMA IN FORENSIC ACCOUNTING SYLLABUS The aim of this module is to give participants an introduction

More information

John Keel, CPA State Auditor Medicaid Fraud Control Activities at the Office of the Attorney General

John Keel, CPA State Auditor Medicaid Fraud Control Activities at the Office of the Attorney General John Keel, CPA State Auditor An Audit Report on Medicaid Fraud Control Activities at the Office of the Attorney General Report No. 08-040 An Audit Report on Medicaid Fraud Control Activities at the Office

More information

SECURITIES EXAMINER (ENTRY) 5670

SECURITIES EXAMINER (ENTRY) 5670 SECURITIES EXAMINER (ENTRY) 5670 GENERAL DESCRIPTION OF CLASS The SECURITIES EXAMINER (ENTRY), under the guidance of a Securities Examiner, analyzes and evaluates the activities of individuals and businesses

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft

FEDERAL IDENTITY THEFT TASK FORCE. On May 10, 2006, the President signed an Executive Order establishing an Identity Theft FEDERAL IDENTITY THEFT TASK FORCE Attorney General Alberto Gonzales Federal Trade Commission Chairman Deborah Platt Majoras On May 10, 2006, the President signed an Executive Order establishing an Identity

More information

Theft, Fraud & Dishonest Employees. An Employee Fraud Case Study. Presented by Jon Coley, Partner, Employment

Theft, Fraud & Dishonest Employees. An Employee Fraud Case Study. Presented by Jon Coley, Partner, Employment Theft, Fraud & Dishonest Employees An Employee Fraud Case Study Presented by Jon Coley, Partner, Employment Case Study, Part 1 Brenda is a Deputy Finance Manager in the finance team covering holiday for

More information

Applying appropriate sanctions consistently

Applying appropriate sanctions consistently Applying appropriate sanctions consistently Policy statement April 2013 Tackling fraud and managing security Contents 1 Introduction... 1 2 The NHS Protect approach to pursuing sanctions... 1 3 The criminal

More information

Langara College Spring 2007 - archived

Langara College Spring 2007 - archived Course: Criminal Justice 217 INSTRUCTOR: Mr. Laurie Lowes Phone: Office: 323-5482 Work: 272-7115 (Voice Mail) Home: 597-4373 OFFICE HOURS: 7:30 am - 8:30 am Thursday and Friday (Also by appointment) COURSE

More information

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES

More information

ISO IEC 27002 2005 (17799 2005) TRANSLATED INTO PLAIN ENGLISH

ISO IEC 27002 2005 (17799 2005) TRANSLATED INTO PLAIN ENGLISH 13.1 REPORT INFORMATION SECURITY EVENTS AND WEAKNESSES 1 GOAL Make sure that information system security incidents are promptly reported. 2 GOAL Make sure that information system security events and weaknesses

More information

COUNCIL OF EUROPE COMMITTEE OF MINISTERS

COUNCIL OF EUROPE COMMITTEE OF MINISTERS COUNCIL OF EUROPE COMMITTEE OF MINISTERS Recommendation Rec(2006)8 of the Committee of Ministers to member states on assistance to crime victims (Adopted by the Committee of Ministers on 14 June 2006 at

More information

ARKANSAS FIDELITY BOND TRUST FUND STATE, COUNTY, MUNICIPAL AND SCHOOL DISTRICT BLANKET DISHONESTY BOND Policy No. FBTF12

ARKANSAS FIDELITY BOND TRUST FUND STATE, COUNTY, MUNICIPAL AND SCHOOL DISTRICT BLANKET DISHONESTY BOND Policy No. FBTF12 ARKANSAS FIDELITY BOND TRUST FUND STATE, COUNTY, MUNICIPAL AND SCHOOL DISTRICT BLANKET DISHONESTY BOND Policy No. FBTF12 Administered By: THE ARKANSAS GOVERNMENTAL BONDING BOARD Chair: Arkansas Insurance

More information

Modalities for Forensic Review of Computer Related Frauds

Modalities for Forensic Review of Computer Related Frauds Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance

More information

CURRICULUM VITAE. BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada)

CURRICULUM VITAE. BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada) CURRICULUM VITAE BRIAN HELLER Certified as a Specialist in Criminal Litigation (Law Society of Upper Canada) HELLER, RUBEL Barristers 120 Adelaide Street West Suite 1902 Toronto, Ontario M5H 1T1 business:

More information

DATA BREACH COVERAGE

DATA BREACH COVERAGE THIS ENDORSEMENT CHANGES THE POLICY. PLEASE READ THIS CAREFULLY. DATA BREACH COVERAGE SCHEDULE OF COVERAGE LIMITS Coverage Limits of Insurance Data Breach Coverage $50,000 Legal Expense Coverage $5,000

More information

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Graduate Council Document 08-41a Approved by the Graduate Council on May 6, 2010 PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING & FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Proposal

More information

Fraud Investigation Officer

Fraud Investigation Officer Hammersmith & Fulham borough of opportunity Fraud Investigation Officer Finance and Corporate Services Application Pack Information for applicants Job Description/Selection Criteria Corporate Anti Fraud

More information

How To Prevent Fraud On A Credit Card

How To Prevent Fraud On A Credit Card Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies

More information

Audits of Financial Statements that Contain Amounts that Have Been Determined Using Actuarial Calculations

Audits of Financial Statements that Contain Amounts that Have Been Determined Using Actuarial Calculations Audits of Financial Statements that Contain Amounts that Have Been Determined Using Actuarial Calculations January 2011 Canadian Institute of Chartered Accountants Canadian Institute of Actuaries Audits

More information

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.

CAPABILITY STATEMENT. > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com. CAPABILITY STATEMENT > Forensic Technology Team < Daniel Hains, Director t (07) 3228 4028 e dhains@vincents.com.au w www.vincents.com.au CAPABILITY FORENSIC TECHNOLOGY INDEX Page No. Introduction... 3

More information

In Brief. Just the Facts

In Brief. Just the Facts In Brief Just the Facts N ardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including the FCPA/UK Bribery Act and other corruption-related investigations,

More information

Training Asset or Risk?

Training Asset or Risk? Training Asset or Risk? As security professionals, we are accustomed to identifying assets and protecting them. We are also familiar with the process by which this is accomplished: identify our assets,

More information

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings: BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime

More information

Piecing Digital Evidence Together. Service Information

Piecing Digital Evidence Together. Service Information Piecing Digital Evidence Together Service Information Services Overview Mobile and Tablet Forensics Mobile Phone Forensics is the legally tested and approved systematic examination of mobile phones, SIM

More information

Audit Committee Oversight of Foreign Operations. November 2014

Audit Committee Oversight of Foreign Operations. November 2014 Audit Committee Oversight of Foreign Operations November 2014 The Issue External auditor oversight can be a challenge for audit committees of reporting issuers with operations in foreign jurisdictions.

More information

Protecting your privacy

Protecting your privacy Protecting your privacy Table of Contents Answering your questions about privacy Your privacy... 1 Your consent... 1 Answering your questions about privacy... 2 About cookies... 9 Behavioural Advertising/Online

More information

FEI Canada. Fraud Prevention. Presented by: Matthew McGuire and Leigh Beijer. Date:

FEI Canada. Fraud Prevention. Presented by: Matthew McGuire and Leigh Beijer. Date: FEI Canada Fraud Prevention Presented by: Date: Matthew McGuire and Leigh Beijer June 11, 2015 Agenda Presenter Introductions Overview Elements of a fraud program Investigating Fraud Page 2 Presenter Introductions

More information

METHODIST HEALTH SYSTEM ADMINISTRATIVE TITLE: DETECTING FRAUD AND ABUSE AND AN OVERVIEW OF THE FEDERAL AND STATE FALSE CLAIMS ACTS

METHODIST HEALTH SYSTEM ADMINISTRATIVE TITLE: DETECTING FRAUD AND ABUSE AND AN OVERVIEW OF THE FEDERAL AND STATE FALSE CLAIMS ACTS METHODIST HEALTH SYSTEM ADMINISTRATIVE Formulated: 6/19/07 Reviewed: Revised: Effective: 10/30/07 TITLE: DETECTING FRAUD AND ABUSE AND AN OVERVIEW OF THE FEDERAL AND STATE FALSE CLAIMS ACTS PURPOSE: Methodist

More information

36 PRACTICALTAX STRATEGIES JULY2009 ANNE MARIE MINOGUE

36 PRACTICALTAX STRATEGIES JULY2009 ANNE MARIE MINOGUE D Although the odds of being the target of an IRScriminal Investigation are small, the potential penalty can be quite high, so Investigation targets should obtain expert advice. ANNE MARIE MINOGUE any

More information

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

More information

Federation of Law Societies of Canada. Ottawa, November 26, 2013

Federation of Law Societies of Canada. Ottawa, November 26, 2013 Submission to the Standing Senate Committee on Banking, Trade and Commerce in Respect of Bill C-4 (a second Act to implement certain provisions of the budget tabled in Parliament on March 21, 2013 and

More information

CHAPTER 26.1-02.1 INSURANCE FRAUD

CHAPTER 26.1-02.1 INSURANCE FRAUD CHAPTER 26.1-02.1 INSURANCE FRAUD 26.1-02.1-01. Definitions. As used in this chapter: 1. "Business of insurance" means the writing of insurance or the reinsuring of risks by an insurer, including acts

More information

Anti-Money Laundering and Counter- Terrorism Financial Policy

Anti-Money Laundering and Counter- Terrorism Financial Policy Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION

More information

Accountability Report Card Summary 2013 Pennsylvania

Accountability Report Card Summary 2013 Pennsylvania Accountability Report Card Summary 2013 Pennsylvania Pennsylvania has a passable state whistleblower law: Scoring 61 out of a possible 100; Ranking 17 th out of 51 (50 states and the District of Columbia).

More information

Fraud Policy FEBRUARY 2014

Fraud Policy FEBRUARY 2014 Fraud Policy FEBRUARY 2014 TABLE OF CONTENTS 1. Application of Policy... 2 2. Purpose of Policy... 2 3. Fraud Policy... 2 4. Definition of Fraud... 2 5. Duties and Responsibilities of an Employee or Contractor...

More information

ATO Submission Inquiry into penalties for white collar crime

ATO Submission Inquiry into penalties for white collar crime ATO Submission Inquiry into penalties for white collar crime Senate Economics References Committee 1 April 2016 EXTERNAL UNCLASSIFIED Table of Contents Introduction... 3 Executive summary... 3 The scope

More information

Content Specification Outlines Certified Management Accountant (CMA) Examinations

Content Specification Outlines Certified Management Accountant (CMA) Examinations Effective January 1, 2015 Content Specification Outlines Certified Management Accountant (CMA) Examinations The content specification outlines presented below represent the body of knowledge that will

More information

Whistle Blower Policy

Whistle Blower Policy 22 Ulsoor Road, Bangalore - 42 Section No : WB-A Copy No : Page No : 1 of 9 Whistle Blower Policy 22 Ulsoor Road, Bangalore - 42 Section No : WB-B Copy No : Page No : 2 of 9 Contents Sl. No. Title Section

More information

British Columbia Justice Reform Initiative Submission

British Columbia Justice Reform Initiative Submission British Columbia Justice Reform Initiative Submission Prepared by the Canadian Bankers Association June 29, 2012 EXPERTISE CANADA BANKS ON LA RÉFÉRENCE BANCAIRE AU CANADA Introduction The Canadian Bankers

More information

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008

Feature. How to Maximize Evidential Weight of Electronically Stored Information Recommendations of BS 10008 Feature Haris Hamidovic, CIA, ISMS IA, ITIL, IT Project+, is chief information security officer at Microcredit Foundation EKI Sarajevo, Bosnia and Herzegovina. Prior to his current assignment, Hamidovic

More information