Business Controls, Inc. Solutions

Uploaded on

Here’s how our process works: …

Here’s how our process works:

1. Discovery - Our phone and web-based hotline offer a confidential avenue for employees to let you know what’s happening when the boss isn’t looking

2. Verification and Analysis - When an incident is reported, we have methods that we both teach our clients and can employ as a third party investigator to get to the heart of the issue.

3. Resolution - Workplace investigations are different than criminal investigations. We understand the best, fastest and most legally defensible methods to accomplish resolution. We wrote the book on it…ten actually.

4. Education - Unless you’re in law enforcement or a private investigator, investigations are not part of your everyday routine. They can also be emotionally and politically charged causing personal and organizational stress. Our in-depth training covers best practices to engage people in the investigation to uncover more facts, more quickly in order to resolve the issue effectively for all parties involved.

5. Prevention - Preventing the same incidents recurring across the organization is key. Our investigations and assessments help companies develop policies that do just that—creating a healthier, more productive workplace.

More in: Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. January 18, 2011 © 2011 All Rights Reserved. Page 1
  • 2. DiscoveryAnonymous reportingOngoing communicationsDocument attachmentsControl accessSecure database © 2011 All Rights Reserved. Page 2
  • 3. VerificationTrue nature and scopeWho was involved; whyCollect informationLeast disruptive to organizationBest possible ROI © 2011 All Rights Reserved. Page 3
  • 4. AnalysisResearchDue diligenceIT forensicsThreat / risk assessmentSecurity assessment © 2011 All Rights Reserved. Page 4
  • 5. ResolutionCorrective actionDisciplinary actionSeparation agreementsPolicy review © 2011 All Rights Reserved. Page 5
  • 6. EducationProcess of InvestigationInvestigative InterviewingFraud Detection / PreventionI-9 VerificationWorkplace Violence Prevention © 2011 All Rights Reserved. Page 6
  • 7. PreventionPolicy reviewProcess improvementHarness the power ofhotlines © 2011 All Rights Reserved. Page 7
  • 8. Anonymous Reporting40.2% fraud detected by tips25% exceed $1M in lossesRegulatory complianceLitigation avoidanceRisk insurance © 2011 All Rights Reserved. Page 8
  • 9. DifferentiatorsInsight in an Instant™Custom distribution/notificationOngoing communicationsFull audit trackingProfessional consultation © 2011 All Rights Reserved. Page 9
  • 10. OptionsCustomize messageCase managementStatistical analyticsRebranding © 2011 All Rights Reserved. Page 10
  • 11. Core Application24/7/365 web and phoneMultilingual supportSecure databaseData archivalSaaS model © 2011 All Rights Reserved. Page 11
  • 12. NAICS561611 Investigation Services611430 Professional Development Training541990 Other Professional, Scientific and Technical Services541612 Human Resources Consulting Services641199 All Other Legal Services © 2011 All Rights Reserved. Page 12
  • 13. CompliantDodd-FrankFederal Sentencing GuidelinesJeanne Clery ActUS Rehab Act, Section 508Safe Harbor Certified © 2011 All Rights Reserved. Page 13
  • 14. CompliantSOX AIR 21FAR ARRAFCRA CPSIAFERPA FRSADoD FSMAReauthorization NTSSAERA PPACAAmendments STAA © 2011 All Rights Reserved. Page 14