Business Controls, Inc. Solutions

503 views

Published on

Here’s how our process works:

1. Discovery - Our phone and web-based hotline offer a confidential avenue for employees to let you know what’s happening when the boss isn’t looking

2. Verification and Analysis - When an incident is reported, we have methods that we both teach our clients and can employ as a third party investigator to get to the heart of the issue.

3. Resolution - Workplace investigations are different than criminal investigations. We understand the best, fastest and most legally defensible methods to accomplish resolution. We wrote the book on it…ten actually.

4. Education - Unless you’re in law enforcement or a private investigator, investigations are not part of your everyday routine. They can also be emotionally and politically charged causing personal and organizational stress. Our in-depth training covers best practices to engage people in the investigation to uncover more facts, more quickly in order to resolve the issue effectively for all parties involved.

5. Prevention - Preventing the same incidents recurring across the organization is key. Our investigations and assessments help companies develop policies that do just that—creating a healthier, more productive workplace.

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
503
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Business Controls, Inc. Solutions

  1. 1. January 18, 2011 © 2011 All Rights Reserved. Page 1
  2. 2. DiscoveryAnonymous reportingOngoing communicationsDocument attachmentsControl accessSecure database © 2011 All Rights Reserved. Page 2
  3. 3. VerificationTrue nature and scopeWho was involved; whyCollect informationLeast disruptive to organizationBest possible ROI © 2011 All Rights Reserved. Page 3
  4. 4. AnalysisResearchDue diligenceIT forensicsThreat / risk assessmentSecurity assessment © 2011 All Rights Reserved. Page 4
  5. 5. ResolutionCorrective actionDisciplinary actionSeparation agreementsPolicy review © 2011 All Rights Reserved. Page 5
  6. 6. EducationProcess of InvestigationInvestigative InterviewingFraud Detection / PreventionI-9 VerificationWorkplace Violence Prevention © 2011 All Rights Reserved. Page 6
  7. 7. PreventionPolicy reviewProcess improvementHarness the power ofhotlines © 2011 All Rights Reserved. Page 7
  8. 8. Anonymous Reporting40.2% fraud detected by tips25% exceed $1M in lossesRegulatory complianceLitigation avoidanceRisk insurance © 2011 All Rights Reserved. Page 8
  9. 9. DifferentiatorsInsight in an Instant™Custom distribution/notificationOngoing communicationsFull audit trackingProfessional consultation © 2011 All Rights Reserved. Page 9
  10. 10. OptionsCustomize messageCase managementStatistical analyticsRebranding © 2011 All Rights Reserved. Page 10
  11. 11. Core Application24/7/365 web and phoneMultilingual supportSecure databaseData archivalSaaS model © 2011 All Rights Reserved. Page 11
  12. 12. NAICS561611 Investigation Services611430 Professional Development Training541990 Other Professional, Scientific and Technical Services541612 Human Resources Consulting Services641199 All Other Legal Services © 2011 All Rights Reserved. Page 12
  13. 13. CompliantDodd-FrankFederal Sentencing GuidelinesJeanne Clery ActUS Rehab Act, Section 508Safe Harbor Certified © 2011 All Rights Reserved. Page 13
  14. 14. CompliantSOX AIR 21FAR ARRAFCRA CPSIAFERPA FRSADoD FSMAReauthorization NTSSAERA PPACAAmendments STAA © 2011 All Rights Reserved. Page 14

×