4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!/4/[email protected]:0 1/21
PRINTED BY: [email protected] Printing is for personal, private use only. No part of this book
may be reproduced or transmitted without publisher's prior permission. Violators will be prosecuted.
that a governmental unit is required by law to keep or those that are necessary for a
governmental unit to keep in order to discharge its duties imposed by law.
Many types of public records contain similar information about individuals or entities. Yet
each agency or governmental unit is responsible for quite different functions that may
require them to maintain very unique information. The investigator should be prepared to
consult a variety of public records in order to gather the information necessary.
Local or County Records
The great majority of an individual’s civil records can be found at the county courthouse in
the jurisdiction where the subject does business or resides.
Voter Registration Records
In order to vote, citizens must register in their respective precincts by filling out a form
detailing their name, address, date of birth, Social Security number, and signature. Voter
registration records are routinely verified by the county, and old addresses are deleted as
new ones appear.
Marriage License Records
Marriage license information includes the couple’s married names, the maiden name of the
female, the addresses of the individuals, proof of the couple’s identities (driver’s license
numbers or passports), and both parties’ dates of birth.
Real Property Records
When an individual purchases real estate, he becomes a taxpayer and a registrant in several
county records. Each real estate transaction will list a deed verifying the transfer of the
property. If the individual either buys or sells a house or piece of property, or if his real
property becomes subject to a state or federal lien, the transaction will be reflected in the
county real property indexes. Additionally, if improvements are made to the property (e.g.,
adding a new room or installing a pool), a mechanic’s lien or other notice may be on file in
the county property records.
A search of these records will reveal:
374
375
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!/4/[email protected]:0 2/21
• Residency and addresses of buyer and seller (referred to respectively as grantor and
grantee)
• Price of the property
• Mortgage company and amount originally financed
• Real estate ownership
• Who financed the transaction, if applicable
• Title companies involved
• Improvements to the property and the names and addresses of the contractors
Property Tax Records
Most counties charge landowners with property taxes for upkeep of local their schools,
courthouses, police forces, and so forth. Property tax records can provide the fraud
examiner w.
The primary goal of the screening process is to find a desirable tenant, typically a stable occupant who is a good credit risk and will not damage the premises or disturb other tenants.
Chris Roush presented "Investigating Private Companies" at the Donald W. Reynolds National Center of Business Journalism's free workshop, "Investigating Private Companies and Nonprofits."
For more information about free training for business journalists, please visit businessjournalism.org.
This tutorial was presented by Chris Roush, director of the Carolina Business News Initiative, University of North Carolina, Chapel Hill. He presented it for the Reynolds Center for Business Journalism in 2009.
This document provides information about protecting your credit history and documents needed for employment. It discusses checking your credit report from the three major credit agencies, what to do if you experience identity theft, placing security freezes on your credit, and other reports containing your personal information. It also outlines documents required by employers, including new hire forms, W-4 forms, and I-9 forms. Overall, the document aims to educate individuals on understanding their credit and ensuring proper documentation for job applications and hiring processes.
Chris Roush presents "Investigating Private Companies and Nonprofits" in Minneapolis on Oct. 4, 2011 at the Star Tribune during the Reynolds Center's free workshop, "Business Journalism Boot Camp."
For more information about training for business journalists, please visit businessjournalism.org.
Chris Roush presents "Investigating Private Companies and Nonprofits" at the free business journalism workshop, "Covering Business on Tribal Lands," hosted by the Donald W. Reynolds National Center for Business Journalism and the Native American Journalists Association.
For more information about free training for business journalists, please visit businessjournalism.org.
A UBO is an individual who ultimately owns or controls 25% or more
of an entity (whether directly as a shareholder or indirectly via control
of companies) or other entities or structures that control the entity. In
short, it is the ultimate beneficiary regardless of the chain of control.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The primary goal of the screening process is to find a desirable tenant, typically a stable occupant who is a good credit risk and will not damage the premises or disturb other tenants.
Chris Roush presented "Investigating Private Companies" at the Donald W. Reynolds National Center of Business Journalism's free workshop, "Investigating Private Companies and Nonprofits."
For more information about free training for business journalists, please visit businessjournalism.org.
This tutorial was presented by Chris Roush, director of the Carolina Business News Initiative, University of North Carolina, Chapel Hill. He presented it for the Reynolds Center for Business Journalism in 2009.
This document provides information about protecting your credit history and documents needed for employment. It discusses checking your credit report from the three major credit agencies, what to do if you experience identity theft, placing security freezes on your credit, and other reports containing your personal information. It also outlines documents required by employers, including new hire forms, W-4 forms, and I-9 forms. Overall, the document aims to educate individuals on understanding their credit and ensuring proper documentation for job applications and hiring processes.
Chris Roush presents "Investigating Private Companies and Nonprofits" in Minneapolis on Oct. 4, 2011 at the Star Tribune during the Reynolds Center's free workshop, "Business Journalism Boot Camp."
For more information about training for business journalists, please visit businessjournalism.org.
Chris Roush presents "Investigating Private Companies and Nonprofits" at the free business journalism workshop, "Covering Business on Tribal Lands," hosted by the Donald W. Reynolds National Center for Business Journalism and the Native American Journalists Association.
For more information about free training for business journalists, please visit businessjournalism.org.
A UBO is an individual who ultimately owns or controls 25% or more
of an entity (whether directly as a shareholder or indirectly via control
of companies) or other entities or structures that control the entity. In
short, it is the ultimate beneficiary regardless of the chain of control.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Chris Roush presents "Investigating Private Companies" during the four-day, Reynolds Center webinar, "Investigating Private Companies and Nonprofits."
For more information about free training for business journalists, please visit businessjournalism.org.
Every year billions of dollars in unclaimed money and property is turned over to the State by companies who cannot locate the owners. Unclaimed money and property in the form of bank saving accounts, safety deposit vaults, deposit certificates, estates owned, money orders that were not cashed, insurance policies that are terminated or matured, term deposits, non refunded utility deposits and many other sources. Companies cannot hold on to money owed to another indefinitely. When the company cannot find the property owner, the money must be handed over to the State. State laws require the remittance of unclaimed money, from:
banking and financial organizations
insurance companies
utilities companies
loan companies
safety deposit box contents
public and private pension proceeds
landlords, retailers, and other companies and institutions that collect money in trust.
The Easiest, Most Hassle-Free Way to Make Money!
Law Office Administration & OrganizationMarie Tucker
This document discusses efficient law office operations and administration. It covers topics such as types of law offices, organizing client files, timekeeping and billing processes, conflicts of interest checks, retention of client documents, and maintaining confidentiality according to the Maine Bar Association rules of conduct. The document provides guidance on setting up new client matters, including preparing engagement letters, creating billing accounts, and properly organizing paper or electronic files.
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The title search process begins with accessing public land records held by the county government. A title professional then collects legal documents related to the property to create a Property Abstract or Title Report. This establishes ownership and identifies any title defects. Next, a Title Commitment is issued which outlines what defects need fixing and what will be covered by the title insurance policy. Finally, the title insurance policy is issued based on the results of the search and commitment.
Be the attorney you dreamed of being. Jump start your career with Tully Rinckey PLLC:
http://www.tullylegal.com/careers/
September, 2015 - This course will be led by Tully Rinckey PLLC Partner Graig Zappia, Esq. Mr. Zappia will draw upon his experience as an experienced real estate and corporate law attorney to assist attorneys of all levels of skill and experience in improving their legal knowledge regarding how to form Limited Liability Companies under New York State law. Mr. Zappia will provide guidance to attorneys on the various forms and procedural requirements to form Limited Liability Companies and Professional Limited Liability Companies. Mr. Zappia will provide insight into the merits and flaws of Limited Liability Companies compared to Corporations.
How to screen your prospective tenants properly 2013cweinberg
The document provides guidance to landlords on screening rental applicants. It advises that the primary goal is to find stable tenants who are good credit risks and will not damage property. Landlords can consider an applicant's credit, employment, income, rental history and conduct risks. The document outlines steps landlords should take, including using a rental application to obtain information, verifying the information provided, and obtaining a credit report with the applicant's consent. Landlords must follow fair housing laws and the Fair Credit Reporting Act when screening applicants.
The document summarizes the features and services provided by the LegalShield Identity Theft Plan. It describes how unlimited consultation with a licensed investigator is a core component, allowing members to check for fraudulent activity, get advice on reducing risks, or gain peace of mind. The investigator can look into work history, criminal records, liens/bankruptcies, addresses, assets and other areas to determine if identity theft occurred. If it has, the plan offers full restoration services to resolve all known and potential unknown issues related to new credit, banking, healthcare, taxes, licenses and more. It also includes credit monitoring, monitoring for minors, and notifying members of any changes to their credit files.
The Real Estate Investment News is the Monthly Publication of Mid-America Association of Real Estate Investors. This month at MAREI: Tax Planning, Asset Protection, Retirement Fund Growth and Record Keeping with Quickbooks.
The document outlines several rights and protections for victims of identity theft under federal law. These include the right to create an identity theft report, place fraud alerts on credit reports, dispute fraudulent information on reports, limit financial liability for debts incurred fraudulently, be protected and notified regarding legal proceedings against the identity thief, and receive assistance from the Federal Trade Commission and law enforcement.
The document provides the results of a background check for Taylor Rochelle Meholick (DOB 04-02-1997) conducted by Castle Branch on 07/16/2015. The background check found no criminal records for Ms. Meholick in Pennsylvania or nationwide. It also provides instructions for how to access and verify the background check results online through CertifiedBackground.com using the provided password.
This document provides information and guidance for purchasing a business in Florida as a foreign investor from the UK. It discusses the different types of visas (E-1, E-2, L-1, EB-5) that would allow a UK citizen to live and work in the US after purchasing a business. It emphasizes the importance of consulting with a lawyer to determine the appropriate type of business to purchase to qualify for a visa. The document outlines various considerations for purchasing a business, such as reviewing financial records, contracts, and taxes, and using lawyers and brokers to facilitate the purchase. It stresses only proceeding with a purchase after having a lawyer review any agreements.
This document provides information about buying a business in Florida as a way for British citizens to live and work in the state. It discusses the different types of visas (E-1, E-2, L-1, EB-5) that may be available depending on the type of business investment and outlines the basic steps and considerations for purchasing a business, including working with a lawyer to review agreements and ensure the purchase qualifies for the appropriate visa. The document also briefly describes the typical forms of business organization in Florida and regulatory requirements businesses must follow.
This document provides an overview of landlord-tenant law in Chicago, Illinois. It discusses the key points of the Chicago Residential Landlord Tenant Ordinance (CRLTO), including that it was enacted in 1986 to protect tenant rights. The CRLTO applies to most rental properties in Chicago, except for certain exempted units. Common issues landlords face include mishandling security deposits and failing to properly draft leases in accordance with the CRLTO. The eviction process in Chicago is lengthy and favors tenants. Landlords must follow all requirements of the CRLTO to avoid penalties and ensure tenant compliance.
Chapter 1 presents a list of the top ten Foreign.docxwrite31
Chapter 1 presents a list of the top ten Foreign Corrupt Practices Act cases and instructs students to research one case and present a synopsis. It then provides background on the FCPA, which was enacted in 1977 to prohibit bribery of foreign officials. The FCPA has two main provisions: the anti-bribery provision enforced by the DOJ and accounting provisions enforced by the SEC. In 2010, 23 companies paid $1.8 billion total in settlements for FCPA violations. For example, Oracle Corporation was charged by the SEC for failing to prevent its Indian subsidiary from making unauthorized payments of $2.2 million to phony vendors, which could have been used for bribery. Oracle
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
This document summarizes legal ethics issues for lawyers in a changing profession. It discusses trends affecting law firms like changing firm structures, challenges with marketing and funding, and diversity issues. It also outlines new ABA Model Rule 8.4(g) regarding harassment and discrimination. The document discusses lawyers' role as gatekeepers regarding money laundering. It provides guidance on handling client funds and trust accounts, storing client information, and practicing across state lines. The presentation emphasizes that technological changes require proactive steps to maintain confidentiality and security online.
The document summarizes your rights under the Fair Credit Reporting Act (FCRA). It outlines that you have the right to know what information is in your consumer file, to dispute inaccurate or incomplete information, and to seek damages from violators of FCRA. It also describes that you must be informed if adverse action is taken based on a credit report, and that you can limit prescreened credit offers. Consumer reporting agencies must investigate disputes and correct mistakes.
The document provides a writing portfolio for Shelley M. Riseden that includes a blog post, article, persuasive article, and pleading. The blog post discusses New Jersey's anti-bullying law and defines harassment, intimidation, or bullying. The article describes exceptions to search warrant requirements such as consent searches and probable cause vehicle searches. The persuasive article analyzes how the Gramm-Leach-Bliley Act protects consumers' personal financial information. The pleading is a response to a motion to dismiss an administrative review complaint.
· Present a discussion of what team is. What type(s) of team do .docxalinainglis
· Present a discussion of what team is. What type(s) of team do you have in your organization?
· What is meant by the “internal processes” of a team? Why is it important to manage both the internal processes and external opportunities/constraints of a team?
Note: It should contain 3 pages with citation included and References should be in APA format
.
· Presentation of your project. Prepare a PowerPoint with 8 slid.docxalinainglis
· Presentation of your project. Prepare a PowerPoint with 8 slides illustrating the role in Interdisciplinary care for our aging population (Outcome 1,2,3,4,5) (6 hours).
Make sure it has nursing diagnosis
make sure it's a APA STYLE
make sure it has reference
.
More Related Content
Similar to 4102018 Bookshelf Online Principles of Fraudhttpsonl.docx
Chris Roush presents "Investigating Private Companies" during the four-day, Reynolds Center webinar, "Investigating Private Companies and Nonprofits."
For more information about free training for business journalists, please visit businessjournalism.org.
Every year billions of dollars in unclaimed money and property is turned over to the State by companies who cannot locate the owners. Unclaimed money and property in the form of bank saving accounts, safety deposit vaults, deposit certificates, estates owned, money orders that were not cashed, insurance policies that are terminated or matured, term deposits, non refunded utility deposits and many other sources. Companies cannot hold on to money owed to another indefinitely. When the company cannot find the property owner, the money must be handed over to the State. State laws require the remittance of unclaimed money, from:
banking and financial organizations
insurance companies
utilities companies
loan companies
safety deposit box contents
public and private pension proceeds
landlords, retailers, and other companies and institutions that collect money in trust.
The Easiest, Most Hassle-Free Way to Make Money!
Law Office Administration & OrganizationMarie Tucker
This document discusses efficient law office operations and administration. It covers topics such as types of law offices, organizing client files, timekeeping and billing processes, conflicts of interest checks, retention of client documents, and maintaining confidentiality according to the Maine Bar Association rules of conduct. The document provides guidance on setting up new client matters, including preparing engagement letters, creating billing accounts, and properly organizing paper or electronic files.
Information Compromise and the Risk of Identity Theft Guidance for your Business- Mark - Fullbright
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
The title search process begins with accessing public land records held by the county government. A title professional then collects legal documents related to the property to create a Property Abstract or Title Report. This establishes ownership and identifies any title defects. Next, a Title Commitment is issued which outlines what defects need fixing and what will be covered by the title insurance policy. Finally, the title insurance policy is issued based on the results of the search and commitment.
Be the attorney you dreamed of being. Jump start your career with Tully Rinckey PLLC:
http://www.tullylegal.com/careers/
September, 2015 - This course will be led by Tully Rinckey PLLC Partner Graig Zappia, Esq. Mr. Zappia will draw upon his experience as an experienced real estate and corporate law attorney to assist attorneys of all levels of skill and experience in improving their legal knowledge regarding how to form Limited Liability Companies under New York State law. Mr. Zappia will provide guidance to attorneys on the various forms and procedural requirements to form Limited Liability Companies and Professional Limited Liability Companies. Mr. Zappia will provide insight into the merits and flaws of Limited Liability Companies compared to Corporations.
How to screen your prospective tenants properly 2013cweinberg
The document provides guidance to landlords on screening rental applicants. It advises that the primary goal is to find stable tenants who are good credit risks and will not damage property. Landlords can consider an applicant's credit, employment, income, rental history and conduct risks. The document outlines steps landlords should take, including using a rental application to obtain information, verifying the information provided, and obtaining a credit report with the applicant's consent. Landlords must follow fair housing laws and the Fair Credit Reporting Act when screening applicants.
The document summarizes the features and services provided by the LegalShield Identity Theft Plan. It describes how unlimited consultation with a licensed investigator is a core component, allowing members to check for fraudulent activity, get advice on reducing risks, or gain peace of mind. The investigator can look into work history, criminal records, liens/bankruptcies, addresses, assets and other areas to determine if identity theft occurred. If it has, the plan offers full restoration services to resolve all known and potential unknown issues related to new credit, banking, healthcare, taxes, licenses and more. It also includes credit monitoring, monitoring for minors, and notifying members of any changes to their credit files.
The Real Estate Investment News is the Monthly Publication of Mid-America Association of Real Estate Investors. This month at MAREI: Tax Planning, Asset Protection, Retirement Fund Growth and Record Keeping with Quickbooks.
The document outlines several rights and protections for victims of identity theft under federal law. These include the right to create an identity theft report, place fraud alerts on credit reports, dispute fraudulent information on reports, limit financial liability for debts incurred fraudulently, be protected and notified regarding legal proceedings against the identity thief, and receive assistance from the Federal Trade Commission and law enforcement.
The document provides the results of a background check for Taylor Rochelle Meholick (DOB 04-02-1997) conducted by Castle Branch on 07/16/2015. The background check found no criminal records for Ms. Meholick in Pennsylvania or nationwide. It also provides instructions for how to access and verify the background check results online through CertifiedBackground.com using the provided password.
This document provides information and guidance for purchasing a business in Florida as a foreign investor from the UK. It discusses the different types of visas (E-1, E-2, L-1, EB-5) that would allow a UK citizen to live and work in the US after purchasing a business. It emphasizes the importance of consulting with a lawyer to determine the appropriate type of business to purchase to qualify for a visa. The document outlines various considerations for purchasing a business, such as reviewing financial records, contracts, and taxes, and using lawyers and brokers to facilitate the purchase. It stresses only proceeding with a purchase after having a lawyer review any agreements.
This document provides information about buying a business in Florida as a way for British citizens to live and work in the state. It discusses the different types of visas (E-1, E-2, L-1, EB-5) that may be available depending on the type of business investment and outlines the basic steps and considerations for purchasing a business, including working with a lawyer to review agreements and ensure the purchase qualifies for the appropriate visa. The document also briefly describes the typical forms of business organization in Florida and regulatory requirements businesses must follow.
This document provides an overview of landlord-tenant law in Chicago, Illinois. It discusses the key points of the Chicago Residential Landlord Tenant Ordinance (CRLTO), including that it was enacted in 1986 to protect tenant rights. The CRLTO applies to most rental properties in Chicago, except for certain exempted units. Common issues landlords face include mishandling security deposits and failing to properly draft leases in accordance with the CRLTO. The eviction process in Chicago is lengthy and favors tenants. Landlords must follow all requirements of the CRLTO to avoid penalties and ensure tenant compliance.
Chapter 1 presents a list of the top ten Foreign.docxwrite31
Chapter 1 presents a list of the top ten Foreign Corrupt Practices Act cases and instructs students to research one case and present a synopsis. It then provides background on the FCPA, which was enacted in 1977 to prohibit bribery of foreign officials. The FCPA has two main provisions: the anti-bribery provision enforced by the DOJ and accounting provisions enforced by the SEC. In 2010, 23 companies paid $1.8 billion total in settlements for FCPA violations. For example, Oracle Corporation was charged by the SEC for failing to prevent its Indian subsidiary from making unauthorized payments of $2.2 million to phony vendors, which could have been used for bribery. Oracle
Cybersecurity & Data Privacy 2020 - Introduction to US Privacy and Data Secur...Financial Poise
There is no federal law governing privacy and data security applicable to all US citizens. Rather, individual states and regulatory agencies have created a patchwork of protections that may overlap in certain industries.
This webinar provides an overview of the many privacy and data security laws and regulations which may impact your business, from the state law protecting personal information to regulations covering the financial services industry to state breach notification laws.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/introduction-to-us-privacy-and-data-security-2020/
This document summarizes legal ethics issues for lawyers in a changing profession. It discusses trends affecting law firms like changing firm structures, challenges with marketing and funding, and diversity issues. It also outlines new ABA Model Rule 8.4(g) regarding harassment and discrimination. The document discusses lawyers' role as gatekeepers regarding money laundering. It provides guidance on handling client funds and trust accounts, storing client information, and practicing across state lines. The presentation emphasizes that technological changes require proactive steps to maintain confidentiality and security online.
The document summarizes your rights under the Fair Credit Reporting Act (FCRA). It outlines that you have the right to know what information is in your consumer file, to dispute inaccurate or incomplete information, and to seek damages from violators of FCRA. It also describes that you must be informed if adverse action is taken based on a credit report, and that you can limit prescreened credit offers. Consumer reporting agencies must investigate disputes and correct mistakes.
The document provides a writing portfolio for Shelley M. Riseden that includes a blog post, article, persuasive article, and pleading. The blog post discusses New Jersey's anti-bullying law and defines harassment, intimidation, or bullying. The article describes exceptions to search warrant requirements such as consent searches and probable cause vehicle searches. The persuasive article analyzes how the Gramm-Leach-Bliley Act protects consumers' personal financial information. The pleading is a response to a motion to dismiss an administrative review complaint.
Similar to 4102018 Bookshelf Online Principles of Fraudhttpsonl.docx (20)
· Present a discussion of what team is. What type(s) of team do .docxalinainglis
· Present a discussion of what team is. What type(s) of team do you have in your organization?
· What is meant by the “internal processes” of a team? Why is it important to manage both the internal processes and external opportunities/constraints of a team?
Note: It should contain 3 pages with citation included and References should be in APA format
.
· Presentation of your project. Prepare a PowerPoint with 8 slid.docxalinainglis
· Presentation of your project. Prepare a PowerPoint with 8 slides illustrating the role in Interdisciplinary care for our aging population (Outcome 1,2,3,4,5) (6 hours).
Make sure it has nursing diagnosis
make sure it's a APA STYLE
make sure it has reference
.
· Prepare a research proposal, mentioning a specific researchabl.docxalinainglis
· Prepare a research proposal, mentioning a specific researchable title, background, Review of literature, research questions and objectives, methodology, resources and references.
· Prepare the Gant Chart to indicate the timescale for completing the proposal
RESEARCH PROPOSAL OUTLINE
1. Title
2. Background (introduction)
3. Review of literature
4. Research Questions & objectives
5. Methodology
4.1 Research Design
4.2 Participants
4.3 Techniques
4.4 Ethical Considerations
6. Time scale (Gantt chart)
7. Resources
8. References
.
· Previous professional experiences that have had a profound.docxalinainglis
· Previous professional experiences that have had a profound effect:
Before I started college, my parents wanted me to excel in healthcare knowing its high demand. The path to health care and eventual employment in a notable hospital setting seemed less risky than the one of Art and design. A few networking events and some LinkedIn leads later I came across an opportunity to start a Biomedical Engineering startup in South Florida with two investors willing to mentor me in a field I wasn’t familiar with. Luckily this new venture I was undertaking had a somewhat speculative risk. I made sure they were mostly in my favor thanks to the connections my investors had in the industry, and my background in health care. My hard work and diligence paid off slowly teaching myself the mechanics of the industry through the engineers we would hire. I remember watching how they would calibrate medical devices from pumps to life-saving equipment in awe. And with the same tenacity absorbing all the medical jargon in the Biomed world. I was adamant about doing my best and being the best even if that meant leaving my creative dreams behind. We started the business almost four years ago as a small minority women-owned business in the corner of a business complex. Five biomedical engineers and six technicians later we are still scaling and have since expanded our office from that small corner to the entire business building. Currently, we are a nationally recognized Biomed and medical supply company for some of the largest healthcare facilities in both the civilian and government sector. Yet through out all the achievement I felt the only sense of raw passion was when I collaborated with my engineers in delivering problem solving services to the hospital we served. Their job was to service devices in a hospital at a micro level and I would bridge that gap by identifying problems and finding opportunities in product service at a large-scale. Working hand in hand with the engineers in articulating the hospital need for turnover I would use design through projective process in creating a plan that would work in the most practical sense.
This moment of free creative problem solving was the highlight of my job. It gave me an opportunity to realize that although at times my approach was unconventional it would work. My systematic methodology I had adapted from working with engineers and my innate out of the box idea would come to together to solve some of the most challenging issues. Little did I know that this minor stroke of self-awareness would one day have me consider architecture.
Your current strengths and weaknesses in reaching your goal.
I realized my creative talents in design could not flourish under the pressures of work. I would constantly leave the office feeling drained in a profession my heart was not set on. In this I learned my weakness was how far I was willing to neglect the urge for creativity, and in exchange it jeopardized my sense of purpos.
· Please select ONE of the following questions and write a 200-wor.docxalinainglis
· Please select ONE of the following questions and write a 200-word discussion.
1. The Federal Reserve Board has enormous power over people's lives with its power to set and influence policy that determines monetary policy in the United States. Do you think this is proper for a democracy to provide the FED with so such power? How is the FED held accountable?
2. Do you believe that the roles of government should change from era to era, or should the US determine the proper role of government and try to maintain it through the ages?
3. Explain Executive Power in the US Constitution and briefly the process by which it developed over the years. Do you think the Framers should have been more specific about the powers of the presidency? Should the country try to make it more specific today?
· Please read the discussions below and write a 100 to 150 words respond for each discussion.
1. (question 1) I do believe that this is proper for a democracy to provided such power to FED. Without the FED the economy would face two problem, which are recessions that can lead into depressions, and inflation. The FED needs to have power to endures the country will not fall into economic trouble. In class professor McWeeney stated that the FED has the power to increase interest rates to control inflation, and the power to decrease interest rates so that theres more money in the economy to create more business and jobs so there wont be a recession. The FED needs these power to try to put the economy in a sweet spot. The FED is held accountable to the government and public. The FED does this by being transparent and giving and annual report to congress.
2. (question 2) I believe that the roles of the government should be changed from era to era. My main reason the roles should be changed is because major changes are constantly happening in the field of law. For example, the progressive era and modern era had several economic reforms that had taken place including increased regulation, anti-trust activity, application of an income tax, raise on social insurance programs, etc. Throughout this time, the government gave women the right to vote. I believe the economy is growing rapidly due to employment relationships, better technology, education, new polices, social and economic changes. This is the reason why the roles of the government should be changed from era to era.
Communicating professionally and ethically is one of the
essential skill sets we can teach you at Strayer. The following
guidelines will ensure:
· Your writing is professional
· You avoid plagiarizing others, which is essential to writing ethically
· You give credit to others in your work
Visit Strayer’s Academic Integrity Center for more information.
Winter 2019
https://pslogin.strayer.edu/?dest=academic-support/academic-integrity-center
Strayer University Writing Standards 2
� Include page numbers.
� Use 1-inch margins.
� Use Arial, Courier, Times New Roman.
· Please use Firefox for access to cronometer.com16 ye.docxalinainglis
· Please use
Firefox
for access to
cronometer.com
16 years old Female. Born on 01/05/2005. Height 5’4, 115 lbs
· Menu Analysis
DAY 2
Quesadilla
Fiesta beans
Salsa
Sour cream
Corn
Fruit
· Submit Screen Shot for Nutrient report for assignment menu(s)
§ Right click to use “Take a screenshot” feature (Firefox only) on specific date you want to have screen shot to save/obtain.
Nutrient Report and Food Intake
· The paper must include all required elements including
each
Cronometer, Excess, Deficit, and
G
roup
Summary of your nutrient report and food intake
Excess
:
· List
ALL
Nutrients that are
Over 100% (Except Amino Acids)
on Cronometer Nutrient report
· List
Food Items
on menu that may reflect excess nutrients on Cronometer Nutrient report
Deficit
:
· List
ALL
Nutrients that are
Less than 50% (Except Amino Acids)
on Cronometer Nutrient report
· List
Food Items
on menu that may reflect deficit nutrients on Cronometer Nutrient report
Summary
:
§ Summarize your overall in 1-2 paragraph, evaluation and conclusion of nutrients and food items on the menu.
.
· Please share theoretical explanations based on social, cultural an.docxalinainglis
· Please share theoretical explanations based on social, cultural and environmental factors, which may contribute to victimization from criminal behavior
· Based on your personal or professional experience share your thoughts on what coping mechanism (internal and external), and support processes can be considered if becoming a crime victim?
.
· If we accept the fact that we may need to focus more on teaching.docxalinainglis
· If we accept the fact that we may need to focus more on teaching civic responsibility, how can this work with both "policies and people" in the school where you become principal?
In order to increase the focus on teaching civic responsibility, policy must be in place supporting this goal. A school leader must be willing to invest time and funds into planning, training, and implementing curriculum that emphasizes civics. Staff members may have different levels of interest, understanding, and comfort when it comes to incorporating civic responsibility into their teaching, so providing professional development in this area would be critical. The strategic plan for integrating civic responsibility and the expectations for each teacher’s involvement should be clearly communicated. In addition to establishing these policies regarding civics education, the school leader and teachers must work to model civic responsibility. In addition to sharing his or her vision for increased focus on civics with the school staff, the school leader should work to share his or her vision with school board members, other district personnel including the superintendent, and the greater community. Lastly, school leaders need to support their staff as they take risks and work to develop and implement new activities, discussions, and projects centered around teaching civic responsibility.
· How will you lead your staff in this part of the curriculum?
In leading my staff in this part of the curriculum, I would work to secure professional development related to civic responsibility, as this is not an area that I have expertise in, and work as a staff to develop our vision and implementation goals. I would also provide examples such as the work of the exemplar schools described in the article in integrating civic responsibility across all content areas, implementing service-learning programs, and creating partnerships between the school and community. I would also work within PLTs to develop ways that civic responsibility could be incorporated within their curriculum and remind them that they have my support as they embark on this endea
Required Resources
Text
Baack, D. (2017). Organizational behavior (2nd ed.). Retrieved from https://ashford.content.edu
· Chapter 8: Leadership
Articles
Austen, B. (2012, July 23). The story of Steve Jobs: An inspiration or a cautionary tale? (Links to an external site.)Links to an external site.Wired. Retrieved fom http://www.wired.com/2012/07/ff_stevejobs/all/
Charan, R. (2006). Home Depot’s blueprint for culture change. Harvard Business Review. 84(4), 60-70. Retrieved from EBSCOhost database
Grow, B., Foust, D., Thornton, E., Farzad, R., McGregor, J., & Zegal, S. (2007). Out at home depot (Links to an external site.)Links to an external site.. Business Week.
Retrieved from http://www.businessweek.com/stories/2007-01-14/out-at-home-depot
Stark, A. (1993). What's the matter with business ethics? Harvard Business Review, 71(3), 38-48. .
· How many employees are working for youtotal of 5 employees .docxalinainglis
· How many employees are working for you?
total of 5 employees
· How did you get your idea or concept for the business?
· CLEAR is a reflection by transparency, manifest and understood, our product is new in the market, and it follows the international fashion style that suits every lady,
· A bag represents you, bags are women priority, and its something women can't go outside without, our bags differ by other bags is that its clear, which is the new form of fashion style, we also made customization on bags so it is a remarkable tool that can lead to higher profit through increased customer satisfaction and loyalty, although it brings for our small factory a lot of work, the good work pays off, we entered these industry because there are no locals designer in it and we started in2016 and hope to reach a global position.
· What do you look for in an employee? (the most important things)
- helping customers on their choice
-stylist
- team work spirit
- deciplant & committed to work ethics
- Good Communication skills
- Ability to manage the conflict
- Is the company socially responsible?
Yes , we try our best to make some of sell go for the charity and especially to help poor people get new clothes , we donate 5% yearly in our total sales .
· What made you choose your current location?
Main criterias for selecting current location :
1- Close to the residence areas , meliha road, near the university of Sharjah
2- Easy access to the visiting customers
3- Its in a big avenue that has many designers and clothing brands
4- Easy to pick up from the shop
5- Serve a big segmentation
· What are your responsibilities as a business owner?
the main responsibility of the Business owner is to maintain the successful of the business, but in order to achieve this have to do so many tasks like:
1- Hire and manage the staff
2- Oversees the financial status , weekly and monthly .
3- Create marketing plans of how the business will be in a year
4- Update the website and chick the system
5- Rent fees
6- Make sure how customers are satisfied by the product
7- Make sure about product quality and chick up
8- Maintain a healthy work environment
9- Develop and fine tune the business according to the market situation
· How do you motivate your employees?
We follow different methods for motivations
1- Personal appreciation for individuals for hard work or personal achievements
2- Kind words
3- Flexible working hours
4- Daily bonus if achieved the daily sales targets
5- Giving the new collection bags as a gift before dropping it to the market , it makes them feel appreciated and special
· Can you give me an example of any challenges or problems that you faced with your shop and employees?
Hiring the right employee is always challenge, last Ramadan we had a huge unread massage for eid orders as well, our customer started to get angry and write under the inestgram comments that there was no respond for online shopping , we struggl.
· How should the risks be prioritized· Who should do the priori.docxalinainglis
· How should the risks be prioritized?
· Who should do the prioritization of the project risks?
· How should project risks be monitored and controlled?
· Who should develop risk responses and contingency plans?
· Who should own these responses and plans?
Introduction
This week, we will explore risk management. Risk management is one of those areas in project management that separates good project managers from great project managers. A good project manager makes risk management an integral part of every phase of project work. Risks are identified, prioritized, and understood. There are clear responsibilities within the team as to whose is responsible for implementing a risk response to reduce the impact should it occur. So let's get started.
What is Risk?
*Risk: An uncertain event or condition that, if it occurs, has a positive or negative effect on one or more project objectives.
Risks can be positive, meaning beneficial to the project, or they can be negative, meaning detrimental to the project.
Many students have a difficult time visualizing positive risks. A positive risk is an opportunity that may increase the probability of success, the return on investment, or the benefits of the project. They may also be ways to reduce project costs or ways to complete the project early. There may even be methods to improve project quality or overall performance. These are all examples of positive risks.
A negative risk can be easier to understand. It is the possibility that something will go wrong, a threat to the success of the project. It is important to remember that a risk is a possibility, not a fact. It is a potential problem. At GettaByte Software, there is the potential that a power outage would occur during data transfer. The potential exists that a key resource could become unavailable due to some unforeseen circumstance, like illness. Those are threats to the success of the project.
When buying a house to renovate, there are potential risks with respect to plumbing, wiring, the foundation, and so on.
A project manager needs to consider trying to make positive risks happen while trying to prevent negative ones from occurring. To do this, a project manager can take a proactive approach to risk management. This means he or she plans a risk response should it look as though the risk will become a reality. In this way, everyone knows exactly how to prepare and respond to the risk once it does become an issue.
The Risk Management Process
A project has both good and bad risks, which are referred to as positive and negative risks or opportunities and threats. For positive risks or opportunities, the project manager can choose from a range of risk responses. For threats, a project manager has a similar range of choices. The following, as described in the PMBOK® Guide, are the risk management processes.
Plan Risk Management:
· Risk Strategy
· Defines the general approach to managing risk on the project
· Methodology
· Defines the specific, tools, .
· How does the distribution mechanism control the issues address.docxalinainglis
· How does the distribution mechanism control the issues addressed in Music and TV, when in regards to race/ethnicity?
· Determine who controls the distribution of Music and TV, when in regards to race/ethnicity?
· In what ways does the controller of distribution affect the shared experience of the audience and community? Keep in mind that a community may be local, regional, national, or global. Be specific in your discussion.
.
· Helen Petrakis Identifying Data Helen Petrakis is a 5.docxalinainglis
·
Helen Petrakis Identifying Data: Helen Petrakis is a 52-year-old, Caucasian female of Greek descent living in a four-bedroom house in Tarpon Springs, FL. Her family consists of her husband, John (60), son, Alec (27), daughter, Dmitra (23), and daughter Althima (18). John and Helen have been married for 30 years. They married in the Greek Orthodox Church and attend services weekly.
Presenting Problem: Helen reports feeling overwhelmed and “blue.” She was referred by a close friend who thought Helen would benefit from having a person who would listen. Although she is uncomfortable talking about her life with a stranger, Helen says that she decided to come for therapy because she worries about burdening friends with her troubles. John has been expressing his displeasure with meals at home, as Helen has been cooking less often and brings home takeout. Helen thinks she is inadequate as a wife. She states that she feels defeated; she describes an incident in which her son, Alec, expressed disappointment in her because she could not provide him with clean laundry. Helen reports feeling overwhelmed by her responsibilities and believes she can’t handle being a wife, mother, and caretaker any longer.
Family Dynamics: Helen describes her marriage as typical of a traditional Greek family. John, the breadwinner in the family, is successful in the souvenir shop in town. Helen voices a great deal of pride in her children. Dmitra is described as smart, beautiful, and hardworking. Althima is described as adorable and reliable. Helen shops, cooks, and cleans for the family, and John sees to yard care and maintaining the family’s cars. Helen believes the children are too busy to be expected to help around the house, knowing that is her role as wife and mother. John and Helen choose not to take money from their children for any room or board. The Petrakis family holds strong family bonds within a large and supportive Greek community.
Helen is the primary caretaker for Magda (John’s 81-year-old widowed mother), who lives in an apartment 30 minutes away. Until recently, Magda was self-sufficient, coming for weekly family dinners and driving herself shopping and to church. Six months ago, she fell and broke her hip and was also recently diagnosed with early signs of dementia. Helen and John hired a reliable and trusted woman temporarily to check in on Magda a couple of days each week. Helen would go and see Magda on the other days, sometimes twice in one day, depending on Magda’s needs. Helen would go food shopping for Magda, clean her home, pay her bills, and keep track of Magda’s medications. Since Helen thought she was unable to continue caretaking for both Magda and her husband and kids, she wanted the helper to come in more often, but John said they could not afford it. The money they now pay to the helper is coming out of the couple’s vacation savings. Caring for Magda makes Helen think she is failing as a wife and mother because she no longer ha.
· Global O365 Tenant Settings relevant to SPO, and recommended.docxalinainglis
· Global O365 Tenant Settings relevant to SPO, and recommended settings
Multi Factor Authentication
Sign In Page customization
External Sharing
· Global SPO settings and recommended settings
Manage External Sharing
Site Creation Settings
· Information Architecture and Hub Site Management
Site Structure
Create and manage Hub Site
· Site Administration
Create Sites
Delete Sites
Restored Deleted Sites
Manage Site Admins
Manage Site creation
Manage Site Storage limits
Change Site Address
· Managed Metadata (Term Store)
Introduction
Setup new term group sets
Create and manage Terms
Assign roles and permission to Manage term sets
· Search
Search Content
Search Center
Crawl Site content
Remove Search results
Search Results
Manage Search Query
Manage Query Rules
Manage Query Suggestion
Manage result sources
Manage search dictionaries
· Security (identity – internal / external, and authorization – management of platform level)
Control Access of Unmanaged devices
Control Access of Network location
Authentication
Safeguarding Data
Sign out inactive users
· Governance – e.g. labels, retention, etc.
Data Classification
Create and Manage labels
· Data loss prevention
· Create and Manage security policies
· Devices Security policies
· App permission policies
· Data Governance
· Retention Policies
· Monitoring and alerting
Create and Manage Alerts
Alert Policies
· SharePoint Migration Tool
Overview
· Operational tasks for managing the health of the environment, alerting, etc.
File Activity report
Site usage report
Message Center
Service Health
· Common issue resolution and FAQ
.
· Focus on the identified client within your chosen case.· Analy.docxalinainglis
· Focus on the identified client within your chosen case.
· Analyze the case using a systems approach, taking into consideration both family and community systems.
· Complete and submit the “Dissecting a Theory and Its Application to a Case Study” worksheet based on your analysis
Helen Petrakis Identifying Data: Helen Petrakis is a 52-year-old, Caucasian female of Greek descent living in a four-bedroom house in Tarpon Springs, FL. Her family consists of her husband, John (60), son, Alec (27), daughter, Dmitra (23), and daughter Althima (18). John and Helen have been married for 30 years. They married in the Greek Orthodox Church and attend services weekly.
Presenting Problem: Helen reports feeling overwhelmed and “blue.” She was referred by a close friend who thought Helen would benefit from having a person who would listen. Although she is uncomfortable talking about her life with a stranger, Helen says that she decided to come for therapy because she worries about burdening friends with her troubles. John has been expressing his displeasure with meals at home, as Helen has been cooking less often and brings home takeout. Helen thinks she is inadequate as a wife. She states that she feels defeated; she describes an incident in which her son, Alec, expressed disappointment in her because she could not provide him with clean laundry. Helen reports feeling overwhelmed by her responsibilities and believes she can’t handle being a wife, mother, and caretaker any longer.
Family Dynamics: Helen describes her marriage as typical of a traditional Greek family. John, the breadwinner in the family, is successful in the souvenir shop in town. Helen voices a great deal of pride in her children. Dmitra is described as smart, beautiful, and hardworking. Althima is described as adorable and reliable. Helen shops, cooks, and cleans for the family, and John sees to yard care and maintaining the family’s cars. Helen believes the children are too busy to be expected to help around the house, knowing that is her role as wife and mother. John and Helen choose not to take money from their children for any room or board. The Petrakis family holds strong family bonds within a large and supportive Greek community.
Helen is the primary caretaker for Magda (John’s 81-year-old widowed mother), who lives in an apartment 30 minutes away. Until recently, Magda was self-sufficient, coming for weekly family dinners and driving herself shopping and to church. Six months ago, she fell and broke her hip and was also recently diagnosed with early signs of dementia. Helen and John hired a reliable and trusted woman temporarily to check in on Magda a couple of days each week. Helen would go and see Magda on the other days, sometimes twice in one day, depending on Magda’s needs. Helen would go food shopping for Magda, clean her home, pay her bills, and keep track of Magda’s medications. Since Helen thought she was unable to continue caretaking for both Magda and her husba.
· Find current events regarding any issues in public health .docxalinainglis
·
Find current events
regarding any issues in public health Anything about infectious diseases ( Don not pick one disease, you have you dig more infectious diseases)
· These current events can be articles, news reports, outbreaks, videos.
· Type down brief 2 sentences describing the event (don’t copy paste title)
· You should have
at least 7 diseases in
total
· No Malaria disease events, please
.
· Explore and assess different remote access solutions.Assig.docxalinainglis
· Explore and assess different remote access solutions.
Assignment Requirements
Discuss with your peers which of the two remote access solutions, virtual private networks (VPNs) or hypertext transport protocol secure (HTTPS), you will rate as the best. You need to make a choice between the two remote access solutions based on the following features:
· Identification, authentication, and authorization
· Cost, scalability, reliability, and interoperability
.
· FASB ASC & GARS Login credentials LinkUser ID AAA51628Pas.docxalinainglis
This document provides an overview and summary of the Governmental Accounting Standards Board (GASB) Codification of Governmental Accounting and Financial Reporting Standards.
The summary includes:
1) An explanation of the authoritative sources incorporated into the Codification including GASB statements, interpretations, and other pronouncements as well as NCGA and AICPA standards.
2) Details on the organization and structure of the Codification including its five parts addressing general principles, financial reporting, measurement, specific items, and specialized activities.
3) Guidance on using the Codification and on the authoritative status and hierarchy of GAAP for state and local governments.
4) Background information on the
· Due Sat. Sep. · Format Typed, double-spaced, sub.docxalinainglis
·
Due:
Sat. Sep.
·
Format
: Typed, double-spaced, submitted as a word-processing document.
12 point, text-weight font, 1-inch margins.
·
·
Length
: 850 - 1000 words (approx. 3-4 pages)
·
·
Overview
: In Unit 1 and Unit 2, we focused on ways that writers build ideas from personal memories and experiences into interesting narratives that convey significance and meaning to new audiences. In Unit 3, we have been discussing how writers invent ideas by interacting with other communities through firsthand observation and description. These relationships and discoveries can give writers insight into larger concepts or ideas that are valuable to specific communities. For this writing project, you will use firsthand observations and discoveries to write about people and the issues that are important to them. Your evidence will come from the details you observe as you investigate other people, places, and events.
Assignment
Write an ethnography essay focused on a particular group of people and the routines or practices that best reveal their unique significance as a group.
An ethnography is a written description of a particular cultural group or community. For the ethnography essay, you can follow the guidelines in the CEL, p. 110-112. Your ethnography should:
· Begin with your observations of a particular group. Plan to observe this group 2-3 times, so that you can get a better sense of their routines, habits, and practices.
o
Note: if you cannot travel to observe a group or community, plan to observe that community digitally through website documents, social media, and/or emails exchanged with group members.
· Convey insight into the characteristics that give the group unique significance.
· Provide context and background, including location, values, beliefs, histories, rituals, dialogue, and any other details that help convey the group's significance.
· Follow a deliberate organizational pattern that focuses on one or more insights about the group while also providing details and information about the group's culture and routine
As you look back over your observations and notes, remember that your essay should do more than simply relate details without any larger significance. Ethnographies also draw out the unique, interesting, and special qualities of a group or culture that help readers connect to their values or motivations. Note: Please keep in mind that writing in this class is public, and anything you write about may be shared with other students and instructors. Please only write about details that you are comfortable making public within our classroom community.
Assignment Components
In order to finish this project, we will work on the following parts together over the next few weeks:
Draft
: Include at least one pre-revised draft of your essay. The draft needs to meet the word count of 850 words and must also apply formatting requirements for the project—in other words it must be complete. Make sure that your.
· Expectations for Power Point Presentations in Units IV and V I.docxalinainglis
This document provides guidance for PowerPoint presentations in two units. It outlines 7 requirements for the presentations: 1) include a title slide, 2) include an overview slide after the title, 3) include a summary slide before the references, 4) cite sources on slides with information from readings, 5) do not use direct quotes, 6) include graphics, and 7) format references in APA style with matching in-text citations and reference list entries. It also notes that students can ask the instructor questions and should contact the instructor if they disagree with feedback.
· Due Friday by 1159pmResearch Paper--IssueTopic Ce.docxalinainglis
·
Due
Friday by 11:59pm
Research Paper--
Issue/Topic:
Celebrity, Celebrity Culture and the effects on society
1500 or more words
MLA format
Must include research from
at least 4
scholarly sources (use HCC Library and GoogleScholar) I have attached 20 pdf with scholarly sources to choose from. 2 were provided from teacher Celebrity Culture Beneficial and The Culture of Celebrity. I have also attached a Word Document Research Paper Guide. Please read all the way to bottom more instructions at the bottom. Disregards Links and external cites those are the PDFs.
Celebrity
is a
popular cultural Links to an external site.
phenomenon surrounding a well-known person. Though many
celebritiesLinks to an external site.
became famous as a result of their achievements or experiences, a person who obtains celebrity status does not necessarily need to have accomplished anything significant beyond being widely recognized by the public. Some celebrities use their
fameLinks to an external site.
to reach the upper levels of social status. Popular celebrities can wield significant influence over their fans and followers. Cultural historian and film critic Neal Gabler has described the phenomenon of celebrity as a process similar to performance art in which the celebrity builds intrigue and allure by presenting a manufactured image to the public. This image is reinforced through
advertisingLinks to an external site.
endorsements, appearances at high-profile events, tabloid gossip, and
social mediaLinks to an external site.
presence.
In previous decades, celebrity status was mainly reserved for film stars,
televisionLinks to an external site.
personalities,
entertainersLinks to an external site.
, politicians, and
athletesLinks to an external site.
. Contemporary celebrities come from diverse fields ranging from astrophysics to auto mechanics, or they may simply be famous for their lifestyle or
InternetLinks to an external site.
antics. Social media platforms such as YouTube, Twitter, and Instagram provide the means for previously unknown individuals to cultivate a significant following.
Celebrification
is the process by which someone or something previously considered ordinary obtains stardom. Previously commonplace activities, such as practicing
vegetarianismLinks to an external site.
or wearing white t-shirts, can undergo celebrification when associated with a famous person or major event.
Celebrity culture
exists when stardom becomes a pervasive part of the social order,
commodified
as a commercial brand. Celebrities’ personal lives are recast as products for consumption, with a dedicated fan base demanding information and unlimited access to the celebrity’s thoughts and activities. A niche community such as a fan base can be monetized through effective marketing that links brand loyalty to the consumer’s identity. Fans may be more likely to purchase a product or attend an event if they feel that doing so strengthens their.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
4102018 Bookshelf Online Principles of Fraudhttpsonl.docx
1. 4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 1/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
that a governmental unit is required by law to keep or those that
are necessary for a
governmental unit to keep in order to discharge its duties
imposed by law.
Many types of public records contain similar information about
individuals or entities. Yet
each agency or governmental unit is responsible for quite
different functions that may
require them to maintain very unique information. The
investigator should be prepared to
consult a variety of public records in order to gather the
information necessary.
Local or County Records
The great majority of an individual’s civil records can be found
at the county courthouse in
2. the jurisdiction where the subject does business or resides.
Voter Registration Records
In order to vote, citizens must register in their respective
precincts by filling out a form
detailing their name, address, date of birth, Social Security
number, and signature. Voter
registration records are routinely verified by the county, and old
addresses are deleted as
new ones appear.
Marriage License Records
Marriage license information includes the couple’s married
names, the maiden name of the
female, the addresses of the individuals, proof of the couple’s
identities (driver’s license
numbers or passports), and both parties’ dates of birth.
Real Property Records
When an individual purchases real estate, he becomes a
taxpayer and a registrant in several
county records. Each real estate transaction will list a deed
verifying the transfer of the
property. If the individual either buys or sells a house or piece
of property, or if his real
3. property becomes subject to a state or federal lien, the
transaction will be reflected in the
county real property indexes. Additionally, if improvements are
made to the property (e.g.,
adding a new room or installing a pool), a mechanic’s lien or
other notice may be on file in
the county property records.
A search of these records will reveal:
374
375
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 2/21
• Residency and addresses of buyer and seller (referred to
respectively as grantor and
grantee)
• Price of the property
• Mortgage company and amount originally financed
• Real estate ownership
4. • Who financed the transaction, if applicable
• Title companies involved
• Improvements to the property and the names and addresses of
the contractors
Property Tax Records
Most counties charge landowners with property taxes for upkeep
of local their schools,
courthouses, police forces, and so forth. Property tax records
can provide the fraud
examiner with an idea of the estimated value, for tax purposes,
of the property listed; of the
identity of the owner of a vacant piece of land or a piece of
property, if ownership is
unknown; and of the name of the last person to pay taxes on the
property.
When searching real property and tax records, the examiner
should always look for other
names shown on the documents. Frequently, the name of the
attorney or notary public who
verified the documents is listed, providing another potential
source of further information.
4/10/2018 Bookshelf Online: Principles of Fraud
5. https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 3/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
Health and Fire Departments
Most county health or fire departments conduct routine
inspections of businesses for health
and safety code or fire code violations. These inspectors may
have valuable information
about the business and its operations, employees, and owners.
Sheriff/County Prosecutor
The county sheriff or the county prosecutor may maintain
general incident files related to
the businesses within the county. These incident files can
provide leads on reports or
contacts with the managers or owners of the business or on third
parties who have made
complaints against the subject.
County Fire Marshal
The county fire marshal should have a record of any fires that
have occurred at specific
6. properties. These records may contain information about a
property’s insurer, as well as
information about any previously conducted investigations.
Utility Company Records
Many utility companies are nonprofit corporations or
municipalities. Although the recent
trend has been to restrict access to utility company records,
some companies still make their
records available to the public. Utility records may contain the
phone number of the
customer, even if that number is unlisted.
Permits
If a business or individual constructs a new building or makes
improvements to an existing
building, there should be a building permit on file with the local
building authority. In
addition, before most businesses can open their doors, the city
or county may require that
they possess certain permits. The local fire department may
require permits ensuring that
the business complies with the fire code. The city health
department will require permits
7. for restaurants or other businesses that serve food. Planning and
zoning departments
enforce regulations regarding the types and locations of
businesses.
375
376
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 4/21
State Records
Business Filings
To open a bank account or to conduct business in a name other
than one’s own, the law
requires certain documents to be filed. These documents can
include articles of
incorporation, foreign corporation registration, and fictitious
name or doing business as
(DBA) registration.
Articles of Incorporation Corporations are formed by filing
articles of incorporation with
the secretary of state (or state corporation bureau or corporate
8. registry office) in the state
where the company does business. These corporate records are
public records and will
include:
• Corporate name
• Ownership information
• Stock value
• Initial shareholders
• Names of the directors and officers
• Registered agent
• Location of the principal office
• Date of incorporation
• Standing/status
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 5/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
9. This information will permit the investigator to review a
corporate structure, identify the
registered agent, and trace incorporation dates. The records will
often include limited
partnership information as well.
Foreign Corporation Registration Some states also require
foreign corporations (i.e.,
corporations that were incorporated in another state) that
conduct business transactions in
the state to register with the state corporation office. The
application is typically filed with
the secretary of state and must include the date of incorporation,
the principal office, the
address of the registered agent, and the names of the officers
and directors.
Fictitious Names/Doing Business as Registration
A fictitious name or doing business as (DBA) situation occurs
when a business owner
operates a company under a name that is different from his legal
name. DBA information
for sole proprietorships or partnerships is typically filed at the
county level, though some
states require filing at the state level as well. Most states also
10. require limited partnerships,
trusts, and joint ventures to file DBA information at the state or
county level. DBA filings
will provide insight into the true business venture behind the
name. Very similar to
corporate filings with the Secretary of State, these records will
allow an investigator to
identify the type of business entity, the date the business was
started, and the
owners/principals of the business.
Uniform Commercial Code Filings
A search of Uniform Commercial Code (UCC) filings can help
identify personal property that
an individual or business has financed. UCC statements are
documents filed by lenders with
the secretary of state or with the county level unit to perfect
their security interests in
financed personal property. Banks, finance companies, and
other lenders will generate
records or filings of loans granted to individuals and businesses
and collateralized by
specific assets, such as household furniture, appliances, boats
and yachts, automobiles,
11. aircraft, and business equipment.
UCC filings can also disclose when and where a person obtained
a personal loan, the type of
property that he pledged to the lender to secure the loan, and the
current address of the
debtor. These documents are great sources for reviewing
itemized lists of personal property
held by the debtor.
376
377
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 6/21
Additionally, UCC filings can help fraud investigators uncover
hidden ownership or
relationships between parties by providing the names of all
listed debtors and their
addresses. The examiner may find information linking
individuals to the companies they
own or discover information about a company’s subsidiaries,
branch offices, or parent
12. company.
UCC statements can be readily retrieved from the secretary of
state’s office, through service
companies, or through online public records services.
Employee/Labor Records
Some states’ labor departments require the filing of periodic
lists of employees, revealing
their names, Social Security numbers, and salaries. These
filings can help a fraud examiner
track a subject’s employment and income. In addition, by
examining previous filings, an
investigator can identify former employees of the company.
Workers’ Compensation Information
Because workers’ compensation is a state program, these
records are held at the state level.
Records of workers’ compensation claims are available in most
states and are normally
maintained for seven years, but
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 7/21
13. PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
public access to these records varies from state to state. There
are two types of documents
relating to workers’ compensation cases: (1) injury reports and
(2) court-contested claims.
The reports commonly show the date of the incident, the amount
of time lost, the employer
at the time of the incident, the type of injury, the body part
affected, and the job-related
disability. To obtain workers’ compensation information, the
requesting party must have
the subject’s name and Social Security number. Many states
also require some type of
authorization from the subject before disclosure.
State Tax Filings
The revenue departments of some states require certain
businesses to obtain tax permits,
such as resale licenses or retail sales tax permits. Although tax
returns are generally not
available to the public, information regarding applications for
and issuance of tax permits
14. often is.
Additionally, law enforcement officials may be able to access
corporate, business, and
personal state tax information, which may unwittingly reveal
hidden assets or investments.
Tax returns may also disclose the identity of the accountant or
attorney preparing the
return.
When examining a state tax return, loans to or from officers,
stockholders, or related
entities should be examined closely. Any mortgages, notes, and
bonds shown as liabilities on
a corporate return should be investigated. Interest payments and
interest income are also
very important. Interest income may be shown from a bank that
was previously unknown
to the investigator.
Professional Associations and Licensing Boards
Many state and local agencies or bodies maintain records
identifying individuals who hold
special licenses or memberships. These can include:
• Medical practitioners, such as doctors, dentists, and nurses
15. • Attorneys
• Certified public accountants
• Real estate licensees
• Notaries
• Law enforcement personnel
• Firefighters
377
378
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 8/21
• Security guards
• Stockbrokers
• Teachers
• Insurance agents
• Private investigators
• Bail bond agents
16. • Travel agents
• Barbers, cosmetologists, and massage therapists
• Contractors, engineers, electricians, and architects
The licenses and applications granted by the state may be public
record. Some applications
contain no more than a name and address, but other applications
contain lengthy personal
information, such as previous residential addresses, previous
employers, education and
training, and financial statements.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 9/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
The state regulatory or licensing agency may also have the
authority to suspend or revoke
the licenses necessary for a business to operate.
The Courts
17. Each year, a great deal of litigation occurs, and many people are
subjected to judicial action.
Researching civil and criminal suits can provide invaluable
information to assist in:
• Locating individuals
• Identifying pending actions
• Uncovering closed cases
• Determining marital status
• Tracing sources of funds (e.g., probate)
• Identifying financial conditions (e.g., bankruptcy)
• Discovering litigation history
• Uncovering outstanding judgments
A wealth of information is available from reviewing court files.
Often, civil or criminal
actions are not readily known and the researcher must be able to
identify the jurisdiction,
county, or court involved. Most of the papers filed in civil suits
are accessible as public
records; however criminal and juvenile actions may not be open
to review. Additionally,
different case types are filed at different levels and in different
courts. Therefore, to
18. uncover the information desired, the investigator may be
required to check several types of
courts at several different levels.
Litigation History
Court clerks maintain files on all active and closed lawsuits in
their jurisdictions.
Information regarding these suits is public record and can be
searched by scanning the
indexes for the subject’s name as plaintiff or defendant.
Based on court issues and the financial nature of the claim,
different levels of courts may
have jurisdiction over a given case. To determine a full picture
of the litigation history
against a company or individual, the fraud examiner should
search each of the following
courts:
• State courts
378
379
4/10/2018 Bookshelf Online: Principles of Fraud
19. https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 10/21
∘ State trial courts of general jurisdiction (criminal/civil)
∘ State intermediate appellate courts (criminal/civil)
∘ Highest state courts (criminal/civil)
∘ Probate courts (estate administration)
∘ Family courts (matters concerning adoption, annulments,
divorce, alimony, custody,
child support, etc.)
∘ Traffic courts (minor traffic law violations)
∘ Juvenile courts (cases involving delinquent children under a
certain age)
∘ Small claims courts (civil suits of a relatively low dollar
amount)
∘ Municipal court (offenses against city ordinances)
• Federal courts
∘ U.S. district courts (criminal/civil)
∘ U.S. circuit courts of appeal (criminal/civil)
∘ U.S. Supreme Court (criminal/civil)
20. 4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 11/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of
this book may be reproduced or transmitted without publisher's
prior permission. Violators will be
prosecuted.
∘ Bankruptcy courts (federal)
∘ U.S. Tax Court (cases arising over alleged tax deficiencies)
∘ U.S. Court of International Trade (cases involving tariffs and
international trade
disputes)
Divorce Records
If the subject of the investigation is in the process of becoming,
or has been, divorced, the
fraud examiner may wish to search for the opposing spouse.
Divorce record searches will
return marriage partner names and addresses, location of
marriage, divorce filing date, and
file number. Moreover, court documents from a divorce case
frequently contain the
subject’s financial inventory, which is submitted at the time of
21. the divorce or separation, as
well as the partition of assets to each party in the settlement.
Personal Injury Suit Records
Documents in a personal injury suit will frequently contain an
accident report, injury
history, statements of the involved parties, and information
about the financial settlement
of the case.
Financial Suit Records
Reviewing documents filed in a financial suit will disclose the
subject’s debtors and
creditors, and will present an outside view of an individual’s
business history or ability to
perform.
Bankruptcy Records
Bankruptcy documents are usually located in the federal
bankruptcy court for the district
where the debtor resided or had his principal place of business.
When checking bankruptcy
court records, the fraud examiner should check not only the
individual or business being
investigated, but also any related businesses, principals,
22. employees, or relatives.
The Bankruptcy Code (§107) specifically provides that all
documents filed with federal
bankruptcy courts are public record and can be examined by
anyone without charge. A
bankruptcy case file may include the case number; the debtor’s
name(s), Social Security
379
380
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 12/21
number, and address; the filing date, the bankruptcy chapter
designation; and the case
closure date. It may also include transcripts of depositions or
interviews. If fraud was
suspected, the trustee may have conducted a fraud investigation;
thus, investigators may
wish to check with the trustee to find out whether any such
investigations were undertaken.
Probate Records
23. Probate records are documents filed to show the dispersal of
assets after a subject’s death.
The probate court conducts an investigation to verify any debts
owed by the individual’s
estate and sees to the distribution of assets according to the
deceased’s will (or, if there is no
will, by state law) after all debts are paid. Information about the
debts left in an individual’s
estate will give the investigator the names of persons having an
interest in the deceased’s
estate, as well as the subject’s financial position at the time of
death. Likewise, the dispersal
of assets will reveal the names and addresses of heirs to the
deceased and provide some
indication of the value of the property willed to them.
The Internet
The Internet is often the first place fraud examiners turn for
information. It is an amazing
research tool, but investigators should remember that much of
the information on public
websites is questionable. Fraud examiners should not rely on
information gleaned from
public pages without verifying the authenticity and accuracy of
the information.
24. 4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 13/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
Search engines like Google and Yahoo provide a convenient
way to access the wealth of
information available on the Internet. In addition, there are
many other ways for fraud
examiners to find information online. A list of specific helpful
Internet resources is included
in Appendix A.
Commercial Online Services
A commercial online service may be the best and most efficient
way to conduct public
records searches, as it provides access to a wide range of data in
a single place. There are
several companies that provide varying levels of public record
information to subscribers.
The information is stored on a central database that a subscriber
25. can access from his
computer. Some companies provide information that is actually
retrieved in hard copy and
mailed or faxed to the subscriber, even though the request was
made through the online
service.
While convenient, the use of commercial public record services
comes with an important
caveat for investigators to keep in mind: Online records
companies have to get their
information from somewhere. If the information in the source’s
records is incorrect, the
report received from the database company will also be
incorrect. Therefore, it is essential
to remember that accessing information online is never a full
substitute for actual
examination of the public records themselves.
Directories
Directories are specialized websites that collect the names of
numerous other related
websites, allowing users to browse through a listing of possible
sites to visit. Directories
contain direct links to pages that have a common interest. Some
26. all-inclusive directories
cover a plethora of different topics, and others are more focused
on particular subjects or
disciplines (e.g., accounting and auditing directories that fraud
examiners may find very
useful).
Blogs
A blog is a user-created website consisting of diary-like entries.
Although there are many
different types of blogs, ranging from community and corporate
blogs to blogs focusing on a
particular subject, the most relevant type for fraud examiners is
the personal blog—an
ongoing commentary written by one person.
380
381
https://jigsaw.vitalsource.com/books/9781118233566/epub/OPS/
loc_018.xhtml#eid17682
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 14/21
27. Reviewing an individual’s blog can reveal information that may
be relevant to an
investigation. For example, with information obtained from a
personal blog, the
investigator may be able to establish a timeline of the
individual’s activities or gain insight
into the subject’s thoughts and mindset, which can be used in
the interviewing process.
Blogs, unlike social networks, are generally open to everyone;
furthermore, many blogs can
easily be searched, often using traditional search engines.
Google Blog Search, for example,
uses Google search technology to search blogs. In addition to
traditional search engines,
blogs can be searched via specialized blog-search sites, such as
Technorati and IceRocket.
Social Networking Sites
Social networking sites are specialized websites that help users
develop and maintain their
relationships more easily. Essentially, social networking sites
take traditional networking
activities online. With these sites, users can, generally without
charge, log onto one of the
services, create an account, provide specific details about their
28. life—such as schools
attended, past and present employers, hobbies, sports, and
interests—and become
networked to other individuals that share similar backgrounds
or interests. Once users
become connected to other members, they can view the activity
on each other’s pages.
User pages on social networking sites contain valuable
information. People regularly post
many personal details on their social networking pages,
including information
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 15/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
about their professional profile, academic history, business
connections, personal
affiliations, hobbies, favorite sports teams, opinions, work
schedule, height, weight, gender,
travel schedule, intellectual property, political and charitable
29. causes, updates on family
events, drug or alcohol habits, illnesses, and so on. They may
also post photos and videos,
which can help investigators track changes in physical
appearance and location.
Social networking sites can be searched like traditional
websites; much of the information
available on social networking sites can be found using
traditional search engines.
However, there is an ever-growing number of specialized
resources that an examiner can
also use to search these sites. For example, each social network
has a search engine for
locating members. Users can use these engines to search for
members by name, phone
number, or e-mail address. In general, users can search for
members without logging in,
and searches can usually be done anonymously. If, however, a
member’s profile is private,
the researcher will only see a snapshot of the member’s
information. For example, to view a
member’s profile in Facebook or LinkedIn, the researcher must
connect with the other
member.
30. In addition to traditional search engines and search engines
within social networking sites,
social network search engines are also available and may
provide better results. These
search engines use social networks to order, prioritize, or refine
search results. Some
popular social networking search engines include Spokeo,
Yoname, and FriendFeed.
REPORT WRITING
Fraud examinations conclude with reporting the investigation
results. In general, this
communication takes the form of a formal written report that
includes information
pertinent to the examination engagement. Such a report is
normally used for internal
reporting purposes but may also be used for complaints to
police services or claims to
insurance companies. It is important to note that the topic of
writing reports is broad and
detailed; many of the finer points of report writing are beyond
the scope of this textbook.
However, this section is included to provide a general overview
of the culmination of the
31. investigation techniques discussed throughout this text.
Purpose of the Report
According to anthropologists, some of the earliest forms of
writing were actually drawings
recording ceremonial dances. These drawings were made to
record specific movements so
that others could repeat those that were thought to please the
gods. While technology has
381
382
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 16/21
advanced since those early days, and we no longer write on cave
walls or do ceremonial
dances to please the gods, we still need to record our specific
activities and findings to
comply with policies and procedures and, in some cases, to
satisfy the courts.
The records or reports stemming from an investigation must be
accurate and
32. understandable so that others may know what transpired without
having to speak to the
report’s author. In other words, the report must speak for itself.
An important point to
remember is that an investigation is often judged not by what
was “uncovered,” but by the
way in which the information is presented. As such, a good
investigation report:
• Conveys evidence: The written report communicates all
evidence necessary for
thorough and proper evaluation of the case.
• Adds credibility: Because the written report is completed in a
timely manner, it adds
credibility to the investigation and can be used to corroborate
earlier facts.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 17/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this
book may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
• Accomplishes objectives of case: Knowing that a written
33. report must be issued after the
examination is completed, the report forces the examiner to
consider his actions
beforehand.
Know the Reader
As with any written document, it is important to identify the
reader of the internal report.
Internally, this may include the board of directors, corporate
executives, internal auditors,
and in-house legal counsel.
Each of the readers might have different expectations as to the
information he expects to
see in a report. For instance, the board of directors might only
wish to know that an
investigation was conducted and what the outcome was (such as
the termination and
prosecution of the offending employee). An internal auditor
would likely be more interested
in whether internal controls were overridden, and how. In-house
legal counsel might
wonder whether proper procedures were followed in the
investigation and consequent
employee termination. Ultimately, these internal readers will
34. determine what information
is included in the report.
Along with the expected internal readers, others who are
external to the company might
gain access to the internal investigation report. Some of these
readers may be given the
report voluntarily, and others may gain access to it through
other means, including the
courts. These external readers could include:
• External auditors
• Outside legal counsel (including those retained by employees
who might be the subject
of the internal investigation)
• Law enforcement agencies
• Government attorneys or prosecutors
• Other government agencies (e.g., employment or human rights
commissions)
• Insurance companies
It is important to remember that while not all investigation
reports end up being scrutinized
by lawyers and/or used in a civil or criminal trial, they should
all be written as if they will
35. be. For this reason, the following points should be followed:
382
383
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 18/21
• State only the facts. Do not guess or make assumptions in the
report. If information is
unknown, that fact should be clearly stated.
• Do not make errors. Minor typographical and other errors
might make the report
appear unprofessional and could be embarrassing, especially in
court. In addition to
using a spellchecker, it might be worthwhile to obtain the
services of an independent
proofreader.
• Do have a follow-up section. In some cases, information or
documentation important to
the investigation might not be available to the investigator. This
should be listed in a
36. separate section.
Format
Using a template or standard report format will reduce the
amount of time spent writing a
report while ensuring that all pertinent information is included.
Nevertheless, some
situations might require a customized report format—but even
then the basic format
outlined below should be followed:
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 19/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
• Author/date
• Summary
• Introduction/purpose
• Body
• Results
37. • Follow-up/recommendations
These section names are not mandatory and can be changed to
suit the report writer’s
preferences; but as a general rule, all of the information in these
sections should be
included somewhere in the report.
Summary
This section is intended to give very basic information. It
should set out the main points of
the report in a few sentences and should include the subject,
basis, findings, and outcome of
the investigation.
EXAMPLE
This report deals with an internal investigation conducted at the
Rockside Industries’
Wayside Plant based on an anonymous tip that an employee was
submitting false expense
claims. The investigation determined that $105,375.89 in false
invoices had been submitted
for reimbursement through the purchasing department. The
director of purchasing and a
senior buyer were terminated.
38. Introduction
This section provides more detail on what the report is about
and prepares the reader for
what is to come—that is, the body of the report. Unless there is
a separate section, this is
where the purpose of the report will be explained, along with
any required background
information.
EXAMPLE
This report documents the results of an internal investigation
into the unauthorized use of
purchase cards at the Rockside Industries’ Wayside plant. It is
intended for use by Rockside
Industries in its civil action for recovery of misappropriated
funds and for making a
complaint to police.
383
384
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
39. /4/[email protected]:0 20/21
On May 10, 2010, the security department received an
anonymous tip on the fraud hotline
advising that an invoice for the purchase of a computer backup
power supply (UPS) was
false and that the actual purchase was for a portable DVD
player.
Investigation determined that there was no original invoice for
the transaction on file;
instead, the file contained a photocopy of the invoice. The
purchase was made with a
corporate purchase card issued to Randall Trait, a senior buyer
at Rockside’s Wayside plant.
It had been approved by Robert Morton, the purchasing director.
The vendor, ABLE Tech,
was contacted, and it confirmed that the invoice number on the
file copy matched an
invoice it had for the sale of a portable DVD player.
The Wayside plant has a physical asset database in which all
nondisposable items having a
purchase price of $200 or more are recorded. Each item is
assigned a unique ID number and
barcode label, which are used to track the item. This database is
maintained by the
40. purchasing director. There was no record of the UPS in the
physical assets database, and no
ID number had been issued for any similar item in the past six
months.
An on-site visit was made to ABLE Tech, which has been an
approved vendor since June 12,
2005. The manager, Charles Front, advised that in the past six
months,
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 21/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
384
385
1
Math 30-1: Unit 3/4 Exponents and Logs Assignment
41. Name: _____________________________
If your name does not appear in your writing on the hardcopy
scan – you will lose one mark!
For all questions, show work and clearly indicate your final
answer.
1. State the exponential function represented by the graph. (1
mark)
2. Write the equation for each of the following transformations
to the function y = 4x. Then, state
the domain and range of the transformed function. (2 marks)
“horizontally stretched by a factor of 2, translated 3 units right
and 1 unit down”
3. Solve each of the following equations algebraically. (8
marks)
a) b)
42. Renee
Rectangle
Renee
Typewriter
/53 Marks
2
4. Write each expression in logarithmic form. (2 marks)
5. Write each expression in exponential form. (2 marks)
6. Identify the transformations in .State the domain, range, and
intercepts of the graph. Round your answers to one decimal
place if necessary. (3 marks)
43. 7. Write the equation for each of the following transformations
to the function y = log x. Then,
state the domain and range of the transformed function. (2
marks)
“ translation 5 units right and 4 units down”.
8. Use the laws of logarithms to evaluate each of the following.
(4 marks)
9. Write each of the following as a single logarithm. (4 marks)
3
10. (2 marks)
44. 11. Solve the following logarithmic equations algebraically. (12
marks)
12. Solve the following exponential equations algebraically
using logarithms. Round your
answers to the nearest hundredth. (4 marks)
45. 4
13. The intensity of sound is measured in decibels (dB). The
level of a sound, L, is given by
where I is the intensity of the sound and I0 is the faintest sound
detectable to humans. A
sound engineer increases the volume at a concert from 90
decibels (dB) to 93 dB. Show that
this increase approximately doubles the intensity of the sound.
(2 marks)
14. A strain of bacteria doubles every 4 hours. A sample
contains 40 bacteria. Determine the
time needed until 1000 bacteria are present. (Show work-
including the equation developed
and round your answer to two decimal places.) (2 marks)
46. 15. A water filter removes 40% of the impurities in a sample of
water. Write an exponential
equation to determine the percent of impurities remaining, P,
after the water has passed
through n filters. Then determine how many filters are needed
to remove at least 99% of
impurities in the water. SHOW ALL WORK. (3 marks)
1
Math 30-1: Unit 2 Transformations Assignment
Name: _____________________________ /22 Marks
If your name does not appear in your writing on the hardcopy
scan – you will lose one mark!
SHOW ALL WORK!!
1. Write an equation to represent each translation of the
function y = |x|.
/1
2. For y = f (x) as shown, graph the following.
/1
47. 3. The key point (12, −5) is on the graph of y = f (x). Determine
the coordinates of its image point under
each transformation.
a) /1 b) /1
/1
2
(2, 5) becomes point (x, y). Determine the value of (x, y).
(SHOW WORK)
/2
6. The graph of f (x) is stretched horizontally by a factor of
1
48. 2
about the y-axis and then stretched
vertically by a factor of about the x-axis. Determine the
equation of the transformed function.
/1
value of k. (show work)
/2
8. The graph of the function y = f (x) is given. Graph each of
the following transformations of
the function. Show each stage of the transformation in a
different colour.
/2
49. 1
3
3
9. Determine algebraically the inverse of each function. If
necessary, restrict the domain so that the
inverse of f(x) is also a function. Verify by sketching the graph
of the function and its inverse.
/2
10. One the same grid, sketch the graph of the inverse relation.
/1
11
50. and state the equation of g (x).
/1
t (1, 2) on y
and state the equation of g (x).
/1
4
12.
51. /2
b) Sketch the graph on the same grid above.
/1
-intercept of the
/1
describe how m affects the x-intercepts of
the graph of the function y
/1
52. 1
Polynomial Functions Assignment Name:
________________________
1. Which of the following is NOT a polynomial function?
Explain. (1 mark)
b. 23
2
x
c. 2
2
2
3
2 2
x
53. xy
d.
2
2 2y x x
2. If k, 3k, and -3k/2 are zeros of 3665)(
23
factored form of the polynomial. (1 mark)
is
2
is 8. What is the polynomial? (1 mark)
4. Sketch the graph given the following information: (1
54. mark)
Degree: 3
Zeros: -2, 1
Leading Coefficient : negative
y-int: 4
Renee
Typewriter
Renee
Stamp
2
5. Given the polynomial function 22)(
43
-intercept = -3,
(4 marks)
• Determine the quotient and remainder using long division.
Write the Polynomial
Statement:
56. 3
6. The graph of a polynomial function, ( )P x , is shown below.
(2 marks)
Write the equation of the polynomial, with lowest possible
multiplicity.
7. Write a cubic function with x-intercepts of 3
,
-intercept of -1. (2
marks)
8. Determine the value(s) of k so that the binomial is a factor
of the polynomial. (1 mark)
57. �3 − 6�2 + �� − 6, � − 2
9. Factor the following Polynomial Function fully: (3
marks)
3648510112)(
423
4
10. Quinn, Ralph and Audrey share a birthday on July 3. Quinn
and Ralph are the same age, but
Audrey is two years older than either of the boys. The product
of their ages is 11548 greater
than the sum of their ages. (2 marks)
58. a) Write a polynomial equation that can be used to find the age
of each person.
b) Solve graphically the polynomial equation from part a).
How old is each person?
11. A rectangular prism has a volume of 2100
3
cm . If the height of the prism is x cm and the
width and length of the base is 25x cm , and 10x +1 cm,
respectively, find the dimensions of
the rectangular prism. Solve algebraically.
(2 marks)
1
59. Math 30-1 Midterm Project: At the movies
In 2010, Canadian and American movie-goers spent $10.6
billion on tickets, or 33% of the
worldwide box office ticket sales. Of the films released in 2010,
only 25 were in 3D, but they
brought in $2.2 billion of the ticket sales! You will examine box
office revenues for newly
released movies, investigate graphs of the revenue over time,
determine the function that best
represents the data and graph, and use this function to make
predictions. In this project, you will
explore the use of mathematics to model box office revenues for
a movie of your choice.
PART1: Modelling a curve
It is not easy to determine the best mathematical
model for real data. In many situations, one model
works best for a limited period of time, and then
another model is better. Work with a partner. Let x
represent the time, in weeks, and let y represent the
cumulative box office revenue, in millions of
60. dollars.
• The curves for Avatar and Dark Knight appear to have a
horizontal asymptote. What do you
think this represents in this context? Do you think the curve for
Titanic will eventually exhibit
this characteristic as well? Explain.
• Consider the curve for Titanic.
➢ If the vertex is located at (22, 573), determine a quadratic
function of the form y = a(x -
h)2 + k that might model this portion of the curve.
➢ Suppose that the curve has a horizontal asymptote with
equation y = 600. Determine an
exponential function of the form y = -35(0.65) 0.3(x - h) + k
that might model the curve.
➢ Which type of function do you think better models this
curve? Explain.
PART 2: Modelling Data
The table shows box office receipts for a popular new movie.
• Determine the equation of a logarithmic function of the form y
= 20 log1.3 (x - h) + k that fits the
61. data.
• Determine the equation of an exponential function of the form
y = -104(0.74)x - h + k that fits
the data.
• Compare the logarithmic function to the exponential function.
Is one model better than the
other? Explain.
2
PART 3: At the Movies
• Investigate one of your favourite movies. Find and record the
box office revenues for the first
10 weeks. You may wish to change the time period depending
on the availability of data, but try
to get about ten successive data points.
• Graph the data.
• Which type of function do you think would best describe the
graph? Is one function appropriate
or do you think it is more appropriate to use different functions
for different parts of the domain?
62. • Develop a function (or functions) to model the movie’s
cumulative box office revenue.
• Use your function to predict the cumulative revenue after
week 15.
• Discuss whether this model will work for all movies. Record a
video of yourself giving a brief
presentation of your findings.
3
Project Checklist
I Need To …
-released movies, and then
find and record the box
office revenues for the first 10 weeks of its run (this time period
can be adjusted
depending on the information that is available)
ata from my research
the graph, or if it is more
appropriate to use different functions for different parts of the
domain
63. cumulative box office revenue
15
office revenue for all
movies, and be prepared to present my findings to the class
Ana-Holistic Project Rubric
Criteria Level 1 Level 2 Level 3 Level 4 Level 5
Understanding
• strategies and
mathematical
processes
• develops an
initial start
• develops
some
relevant
strategies
65. minimal
number that
lead to a
partial
solution
• makes some
that
demonstrate
a basic
understandi
ng
• are
reasonable;
demonstrate
a clear
understandi
ng
• are
67. 4
• reflect level of
understandin
g
• could lead
to a correct
solution
• may contain
several
major
mathematic
al errors
• may contain
a major
error or
omission
• may contain
a minor
68. mathematic
al error that
may hinder
understandi
ng in one
part
• may contain
a minor
mathematica
l error that
does not
affect
understandin
g or the final
response
Communicating
• use of
mathematical
69. language
• uses poorly
or does not
use
• uses little or
none
• uses
common
language
• uses
appropriate
language
• uses
significant
language
• level of
support for
conclusions
70. • provides
weak or no
support
• provides
little or no
support
• provides
minimal
support
• provides
clear
support
• provides
in-depth
support
Criteria Level 1 Level 2 Level 3 Level 4 Level 5
Presenting
71. •
appropr
iateness of
format
• includes an
initial start
to a format
• uses format
that may
not be
appropriate
or well
developed
• uses
reasonable
format
• uses
appropriate
74. audience
• may not
consistently
communicat
e directly to
audience or
consider
needs/intere
sts of
audience
•
comm
unicates
directly to
audience
• focusses on
needs and
interests of
76. • information
is basic and,
for the most
part, is
supported
by the
research
• information
is accurate
• information
is accurate
and in-
depth
Holistic Project Rubric
Score/Leve
l
Holistic Descriptor
5
77. (Standard
of
Excellence)
Applies/develops thorough strategies and mathematical
processes making
significant comparisons/connections that demonstrate a
comprehensive
understanding of how to develop a complete solution
Procedures are efficient and effective and may contain a minor
mathematical error that does not affect understanding
Uses significant mathematical language to explain their
understanding, and
provides
in-depth support for their conclusion
Presentation is well organized and appropriate for the material
to be
presented, appeals to the audience, and is supported by the
mathematics
of the research and its conclusions
4
(Above
78. Acceptabl
e)
Applies/develops thorough strategies and mathematical
processes for
making reasonable comparisons/connections that demonstrate a
clear
understanding
Procedures are reasonable and may contain a minor
mathematical error
that may hinder the understanding in one part of a complete
solution
Uses appropriate mathematical language to explain their
understanding,
and provides clear support for their conclusion
Presentation is organized and appropriate for the material to be
presented,
generally appeals to the audience, and is generally supported by
the
mathematics of the research and its conclusions
6
79. 3
(Meets
Acceptabl
e)
Applies/develops relevant strategies and mathematical
processes making
some comparisons/connections that demonstrate a basic
understanding
Procedures are basic and may contain a major mathematical
error or
omission
Uses common language to explain their understanding, and
provides
minimal support for their conclusion
Presentation is somewhat organized and appropriate for the
material
being presented, may lack audience appeal or interest, and
includes some
inconsistencies or omissions, with possible inconsistencies
between the
presentation and the mathematics of the research and its
conclusions
80. 2
(Below
Acceptabl
e)
Applies/develops some relevant mathematical process(es)
making minimal
comparisons/connections that lead to a partial solution
Procedures are basic and may contain several major
mathematical errors
Communication is weak
Presentation lacks organization, has weak audience appeal, and
includes
evident inconsistencies and omissions, with some
inconsistencies between
the presentation and the mathematics of the research and its
conclusions
1
(Beginning
)
Applies/develops a start that may be partially correct or could
have led to
81. a correct solution
Procedures are very basic and contain several major
mathematical errors
Communication is weak or absent
Presentation organization is minimal or non-existent. There is
little
audience appeal and many inconsistencies and omissions, with
inconsistencies between the presentation and the mathematics of
the
research and its conclusions
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 1/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
CHAPTER 14: CONDUCTING INVESTIGATIONS AND
WRITING
REPORTS
82. LEARNING OBJECTIVES
14-1 Understand the circumstances that may necessitate an
internal investigation
14-2 Identify who should be part of a fraud examination team
14-3 Define evidence
14-4 Be familiar with several evidence-gathering techniques
14-5 Understand the considerations and concerns related to
preserving documentary
evidence
14-6 Understand the importance of and methods for organizing
documentary evidence
14-7 Identify several sources of evidence and the types of
information each can provide
14-8 Be familiar with the standard format and requirements for
a professional
investigation report
WHEN IS AN INVESTIGATION NECESSARY?
The need for an internal investigation can arise in a number of
circumstances. Obviously,
such an examination may be necessary to determine the source
of losses caused by
83. occupational fraud. A thorough investigation in these
circumstances can help a company
reduce its losses, identify the perpetrator, gather evidence for a
criminal prosecution or civil
trial, and recapture some or all of the amount stolen. It can also
shed light on weaknesses in
the company’s control structure, thereby helping to shore up the
company’s internal
defenses against future employee misconduct.
In addition to preventing losses resulting from fraud, an
organization or its officers may
have legal duties to investigate alleged misconduct. Certain
federal statutes, such as the
Foreign Corrupt Practices Act, are specifically aimed at
detecting wrongful conduct and
require that companies report specific instances of misconduct.
Obviously, to make an
accurate report of misconduct, the company will need to
conduct an investigation into
alleged wrongdoing. Regulatory agencies such as the Securities
and Exchange Commission
require accurate financial reporting by the companies they
oversee, and they have the
power to impose penalties for reports that are inaccurate or that
84. omit facts that could affect
365
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 2/21
the accuracy of the reported information. An investigation can
ensure that all relevant facts
are known and reported.
Officers and directors of companies are also bound by duties of
loyalty and reasonable care
in overseeing the operations of their companies. This means
they must act in
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 3/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
the best interests of the company and take reasonable steps to
prevent harm that the
85. company might suffer as a result of employee misconduct. The
failure to investigate reliable
allegations of misconduct can amount to a violation of these
duties, thereby subjecting the
director or officer to civil liability for any damages that the
company incurs as a result of
the failure to investigate.
In many situations, companies must also conduct an internal
investigation before they can
dismiss an employee who has committed fraud or otherwise
violated company rules and
policies. A thoroughly documented investigation will help
insulate the company from
charges that it discriminated against the employee or otherwise
wrongfully terminated him.
Additionally, when an organization might be liable for the
conduct of one of its employees,
an internal investigation can help mitigate the company’s
liability by cutting off the
wrongful conduct before it is allowed to grow, and by
demonstrating that the company has
an effective program to detect and prevent criminal misconduct
by its employees—a factor
86. that provides for the diminishment of fines under the
Organizational Sentencing Guidelines
(discussed in more detail in Chapter 16).
A company’s managers may find that the best way to fulfill
these legal duties and
requirements is to conduct an internal investigation of known or
suspected misconduct. Put
another way, by failing to adequately investigate an allegation
of employee fraud, a
company may be failing to comply with the law. However, the
decision to investigate is
often based on very specific facts, and whether an investigation
is compelled by some other
legal duty or requirement is best determined by the company’s
lawyer or lawyers, in
consultation with senior management and after considering all
relevant facts.
PLANNING THE INVESTIGATION
Once the decision has been made to pursue an investigation, the
focus shifts. The question is
no longer whether the company should investigate the matter,
but rather how the company
can carry out the investigation in the most efficient, effective
manner. The answer to this
87. primary question requires answering two secondary questions:
• Who will be involved in the investigation?
• What will be the investigative strategy?
Selecting the Investigation Team
365
366
https://jigsaw.vitalsource.com/books/9781118233566/epub/OPS/
loc_017.xhtml#eid17270
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 4/21
Internal investigations of fraudulent activity usually require a
cooperative effort among
different disciplines. Auditors, fraud examiners, line managers,
attorneys, security
personnel, and others are all frequently associated with fraud
examinations. When
choosing an investigation team, it is critical to identify those
who can legitimately assist in
the investigation and who have a genuine interest in the
outcome of the examination. These
88. persons should be included on the investigative team, and all
other personnel should be
segregated. There are a number of reasons for this. First, the
more people involved in the
investigation, the greater the chance that one of those persons
may be somehow implicated
in the fraud itself, or that one of those persons might leak
confidential information about
the investigation. Second, the persons involved in the
investigation team may have to testify
in legal proceedings, or the documents they generate may be
subject to discovery, if the
investigation leads to civil litigation or criminal prosecution.
By limiting the number of
investigators, the company can limit its exposure to discovery.
In
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 5/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
89. addition, any internal investigation, by its nature, can lead to
harsh allegations against one
or more suspects. This in turn can lead to charges of defamation
and invasion of privacy,
among others. These charges will be bolstered if it is found that
the company spread
information about the suspects to people who did not have a
legitimate interest in that
information. Therefore, by limiting the size of the investigation
team, the company can limit
its exposure to certain accusations.
None of this is meant to imply that the company should exclude
otherwise necessary
individuals from the fraud examination team simply out of fear
of potentially harmful legal
repercussions. On the contrary: the primary goal should be to
resolve the allegations of
fraud as thoroughly and efficiently as possible, and that requires
that all necessary persons
be involved in the effort. However, companies should guard
against including extraneous
personnel who add no real value to the team.
A typical investigation team might include the following types
90. of professionals:
• Certified fraud examiners
• Legal counsel
• Internal auditors
• Security personnel
• IT and computer forensics experts
• Human resources personnel
• A management representative
• Outside consultants
Certified Fraud Examiners
A CFE is trained to conduct a complex fraud examination from
inception to conclusion.
Fraud examinations frequently present special problems because
they require an
understanding of complex financial transactions as well as
traditional investigative
techniques. Security personnel might be well versed in
investigative techniques, such as
interviewing witnesses and collecting and preserving evidence
for trial, but they may not
know how to spot a fraudulent transaction on the company’s
91. books. Auditors and
accountants, on the other hand, may recognize a fraud scheme
but may not have the
training to conduct other aspects of an investigation. A CFE has
training in all aspects of a
fraud examination and therefore can serve as a valuable “hinge”
to the investigation team,
tying together the financial examination and more traditional
investigative techniques.
366
367
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 6/21
Legal Counsel
It is crucial to have counsel involved in and, in most cases,
“directing” the investigation, at
least as far as the legal aspects are concerned. An internal
investigation can be a veritable
hornet’s nest of legal questions: Should the company report the
results of the investigation,
92. and to whom? How can the company preserve the
confidentiality of the investigation? How
should the investigation be conducted so as to avoid lawsuits?
What areas can the company
search, and what information can be gathered without violating
an employee’s rights?
When and how can an employee be fired for wrongful conduct?
These are just some of the
issues that investigators will face. The investigation team must
have legal counsel on hand
to sort out these questions, lest the company risk exposing itself
to greater danger than the
threat it is investigating. In addition, by having an attorney
directing the investigation, the
company may be able to protect the confidentiality of its
investigation under the attorney-
client privilege and the work product doctrine.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 7/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
93. permission. Violators will be prosecuted.
Internal Auditors
Internal auditors are often used to review internal documentary
evidence, evaluate tips or
complaints, schedule losses, and provide assistance in technical
areas of the company’s
operations. As was pointed out earlier, auditors are frequently
the people who detect
financial anomalies that lead to fraud investigations. They are
expected to be able to
identify fraud indicators and notify management if an
investigation is required, and they
are charged with assessing the probable level of complicity
within the organization and
with helping design procedural methods to identify the
perpetrators as well as the extent of
the fraud.
Security Personnel
Security department investigators are often assigned the “field
work” stage of the
investigation, including interviewing outside witnesses and
obtaining public records and
other documents from third parties. It is crucial that their work
94. be integrated with the
financial side of the investigation so that the team does not
devolve into two de facto
investigations, one for “financials” and one for “field work.”
The process works best when
all aspects of the investigation are coordinated and focused on
the same goal.
IT and Computer Forensics Experts
If fraud occurs, it is virtually certain that a computer will have
been involved at some point.
A computer may have been used to create false documents or
alter legitimate documents,
and the perpetrators may have used e-mail to communicate. The
information technology
(IT) department may need to be part of an investigation to
safeguard data until it can be
analyzed. IT personnel can also help identify what data is
available and where it is located.
Computer forensics professionals should be used to capture and
analyze digital data.
Because electronic data can be easily altered, only trained
professionals should be used to
secure such data so that it can be analyzed more thoroughly
without disturbing the original
95. files.
Human Resources Personnel
The human resources department should be consulted to ensure
that the laws governing the
rights of employees in the workplace are not violated. Such
involvement will lessen the
367
368
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 8/21
possibility of a wrongful discharge suit or other civil action by
the employee. Advice from a
human resources specialist might also be needed, although
normally this person would not
directly participate in the investigation.
Management Representative
A representative of management or, in significant cases, the
audit committee of the board of
directors, should be kept informed of the progress of the
96. investigation and should be
available to lend necessary assistance. A sensitive internal
investigation has virtually no
hope of success without strong management support.
Outside Consultants
In some cases, particularly those in which the suspect employee
is especially powerful or
popular, it might be useful to employ outside specialists who
are relatively immune from
company politics or threats of reprisals. Such experts might also
have greater experience
and investigative contacts than insiders. In addition, some
investigatory procedures, such as
forensic document analysis, require a high level of proficiency
and expertise and should
therefore only be undertaken by professionals specifically
trained in that field.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 9/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
97. may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
DEVELOPING EVIDENCE
Once it has been determined that an investigation is warranted,
the fraud examiner will
need to take steps to prove or disprove the allegation. This
involves undertaking procedures
designed to collect and develop evidence. Evidence is anything
perceivable by the five
senses, including any proof, such as testimony of witnesses,
records, documents, facts, data,
or tangible objects, that is legally presented at trial to prove a
contention and to induce a
belief in the minds of a jury.
In addition to interviewing witnesses (discussed in Chapter 15)
and using public records
(discussed later in this chapter), investigating a case and
obtaining evidence may involve
the following:
• Covert operations
• Surveillance
• Informants
98. • “Dumpster-diving”
• Subpoenas
• Search warrants
• Voluntary consent
Covert Operations
Covert operations may be used to obtain evidence regarding the
allegation. In some cases,
they are the only way to prove a fraud, and thus must be carried
out with the highest degree
of planning and skill. In a covert operation, the investigator
assumes the identity of another
person—either real or fictitious—to gather evidence. The length
of the operation might vary
depending on the type of case and what evidence is needed. A
written plan detailing specific
objectives, time frames, and approvals should be developed
prior to undertaking an
undercover operation.
The courts have deemed covert operations as an acceptable
method of developing
information, provided there is sufficient probable cause that a
crime has been committed.
99. Entrapment issues, however, are a concern that must be dealt
with in covert operations
conducted by law enforcement. In private corporations,
entrapment is generally not an
368
369
https://jigsaw.vitalsource.com/books/9781118233566/epub/OPS/
loc_016.xhtml#eid16256
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 10/21
issue, but consultation with legal counsel is strongly advised
prior to conducting an
undercover operation.
Pretexting
Covert operations may occasionally involve pretexting, which is
the practice of obtaining
information through some sort of falsehood or deception. The
practice is not always illegal,
but it should be used with extreme caution. For example, if a
fraud examiner is trying to
locate a witness or a suspect, she might call the person’s
100. relative and pretend to be an old
high school friend who is looking for a phone number. Although
this type of pretexting
generally is not illegal, it is illegal to obtain certain types of
information, such as phone
records and financial records, through any type of falsehood.
Additionally, investigators
should never impersonate a member of law enforcement, and
they should never
impersonate an actual person (particularly the individual being
investigated). To do so may
lead to charges of identity theft.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 11/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
The Hewlett-Packard (HP) pretexting scandal provides an
excellent example of what can
happen when an internal investigation is not properly
conducted. The HP scandal began in
101. 2005, when officials at HP initiated a secret internal
investigation to discover the source of
board room leaks. To uncover the source, HP’s chairman hired a
team of investigators to
procure the private phone records of HP’s board members
through pretexting. Through
such efforts, the investigation uncovered the source, and at a
board meeting in May of 2006,
HP’s chairman informed the board of the investigation scheme
and identified the source of
the leaks. After the board asked the offender to resign, a fellow
HP director resigned in
protest of the pretexting methods used during the investigation.
Although HP’s chairman
was confident that pretexting was permissible, she could not
foresee the disastrous fallout
from the investigation. In 2006, the investigators hired by HP
were charged with identity
theft, conspiracy, and wire fraud, and investigations into the
company’s practices were
undertaken by the California attorney general’s office, the U.S.
Attorney in San Francisco,
the FBI, the FCC, and the Securities and Exchange Commission.
Ultimately, HP paid $14.5
102. million to the state of California, and the chairman was removed
from her position. In
response to the scandal, the U.S. Congress passed the Telephone
Records and Privacy
Protection Act of 2006, which makes it an offense to obtain
confidential phone records by
pretending to be someone else.
Before engaging in any type of pretexting activity, investigators
should consult with an
attorney to determine whether the information sought is
protected by state or federal law as
well as whether the planned impersonation method is legally
acceptable.
Surveillance
Surveillance, the secretive and continuous observance of a
suspect’s activities, is another
investigative technique frequently used in developing evidence.
A surveillance initiative
may be undertaken to obtain probable cause for search warrants,
develop other
investigative leads, identify co-conspirators, gather intelligence,
or locate people and things.
Informants
103. Informants are individuals who have specific knowledge of a
criminal activity. They are
used extensively by law enforcement, and can also be used
successfully in private
investigations if handled properly. Although informants can be
extremely helpful in fraud
investigations, the fraud examiner should be cautious in all
interactions with informants.
Because the reasons informants supply information vary—and
can include revenge,
369
370
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 12/21
financial reward, or clearing their consciences—informants may
not be trustworthy. Thus,
the examiner should always document all contact with
informants to help guard against
subsequent problems.
“Dumpster-Diving”
104. On occasion, an investigator might find it necessary to sift
through a suspect’s trash to
obtain evidence and leads. Important documents and
information concerning illegal
activity might be found in the perpetrator’s own garbage. The
courts have upheld that
investigators may sift through trash without a search warrant,
provided that the trash has
left the suspect’s possession. At that point, there is no longer
the reasonable expectation of
privacy; thus it is fair game.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 13/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
Subpoenas
If evidence is held by other parties or is in uncontrolled
locations, specific legal action is
required before attempting to obtain it. This usually takes the
105. form of a subpoena or other
order from the court to produce the documents and records
(including electronic records).
A subpoena duces tecum calls for the production of documents
and records. Other forms of
court orders can be used to obtain witness evidence and
statements. Subpoenas are only
available as part of an existing legal action, such as a grand jury
investigation, pending
criminal charges, or a civil suit. Thus, if no legal action has
been initiated, obtaining
documents by subpoena is not possible.
Search Warrants
There may be occasions when a fraud examiner will be called
upon to assist law
enforcement or will request the assistance of law enforcement in
a particular investigation.
If there is probable cause to believe that certain records are
being used or have been used
in the commission of a crime, the law enforcement officer will
prepare an affidavit for a
search warrant, which will detail the legal reasoning behind the
request for the warrant.
106. Only a judge can issue a search warrant, and only law
enforcement can seek and serve a
search warrant. Obtaining as much intelligence as possible
regarding the location of the
potential evidence is very desirable before writing the search
warrant affidavit. Therefore,
law enforcement personnel will often need guidance from the
fraud examiner as they
conduct pre-search preparation.
Voluntary Consent
Documents can be obtained by voluntary consent. This is often
the simplest means to obtain
documentation, and therefore, it is the preferred method in
many fraud examinations.
However, certain circumstances, such as hesitancy to release
private information, or
resistance by those involved in the scheme, may preclude
obtaining voluntary consent for
access to documents. While consent can generally be either oral
or written, if documents
are obtained from possible adverse witnesses or the target of the
examination, it is
recommended that the consent be acknowledged in writing.
107. PRESERVING DOCUMENTARY EVIDENCE
370
371
https://jigsaw.vitalsource.com/books/9781118233566/epub/OPS/
loc_015.xhtml#eid16160
https://jigsaw.vitalsource.com/books/9781118233566/epub/OPS/
loc_015.xhtml#eid16164
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 14/21
Even if the investigator is careful to obtain the evidence legally,
the case can be lost if the
examination team fails to preserve the evidence so that it is
accepted by the court. For the
evidence to be admissible, basic procedures in its handling must
be followed. Evidence
submitted must be properly identified, and it must be
established that the proper chain of
custody was maintained. In addition, proof must be provided
that the evidence is relevant
and material to the case.
The following general rules should be observed with regard to
the collection and handling
108. of documents:
• Obtain original documents when feasible. Make working
copies for review; keep the
originals segregated.
• Do not touch originals any more than necessary; they might
later have to undergo
forensic analysis.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 15/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this
book may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
• Maintain a good filing system for the documents. This is
especially critical when large
numbers of documents are obtained. Losing a key document is
an unpardonable sin,
and may mortally damage the case. Documents can be stamped
sequentially for easy
reference.
109. Chain of Custody
From the moment evidence is received, its chain of custody
must be maintained for it to be
accepted by the court. This means that a record must be made
when the item is received or
when it leaves the care, custody, or control of the fraud
examiner. This is best handled by a
memorandum of interview with the custodian of the records
when the evidence is received.
The memorandum should state:
• What items were received
• When they were received
• From whom they were received
• Where they are maintained
If the item is later turned over to someone else, a record of this
should also be made—
preferably in memorandum form. All evidence received should
be uniquely marked so that
it can be identified later. The preferable way is to initial and
date the item; however, this
can pose problems in the case of original business records
furnished voluntarily. For them,
110. a small tick mark or other nondescript identifier can be used. If
it is not practical to mark
the original document, it should be placed in a sealed envelope,
which should be initialed
and dated.
Preserving the Document
When initialing a document for future identification, fraud
examiners should only do so in
a noncritical area and using a different type of writing
instrument than was used for the
questioned writings on the document. The examiner should
never write or make markings
on the original document other than his unobtrusive initials for
identification. Likewise, a
document should not be folded, stapled, paper clipped,
crumpled, or altered in any other
way that would affect or change it from its original condition. If
the document is stored in
an envelope, the examiner should be careful not to write on the
envelope and cause
indentations on the original document inside. Photocopies and
laser-printed documents
371
111. 372
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 16/21
should always be stored in paper folders or envelopes, not
transparent plastic envelopes,
which can result in the copies’ sticking to the plastic and
destroying some features of the
document.
If fingerprint examinations are anticipated, the examiner should
use gloves to handle the
documents. Tweezers can also help the examiner avoid leaving
fingerprints, but they
should be used with caution, because they can leave
indentations that might obscure faint
indented writings or the identifiable indentations that are
sometimes left by photocopy and
fax machines. If any known people have inadvertently handled
the documents with bare
hands, their names should be provided to the fingerprint
specialist. It may also be necessary
to provide the expert with sets of inked fingerprints of these
112. people for elimination
purposes.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 17/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
ORGANIZING DOCUMENTARY EVIDENCE
Keeping track of the amount of paper generated is one of the
biggest obstacles in fraud
investigations. It is essential that any documents obtained be
properly organized early on in
an investigation, and that they be continuously reorganized as
the case progresses.
Remember—it is usually difficult to ascertain the relevance of
the evidence early in the
case, so reevaluation throughout the investigation is critical.
Good organization in complex
cases includes the following:
• Segregating documents by either witness or transaction.
113. Chronological organization is
generally the least preferred method.
• Making a “key document” file for easy access to the most
relevant documents. The
examiner should periodically review the key documents, move
the less important
documents to backup files, and keep only the most relevant
documents in the main file.
• Establishing a database early in the case if there is a large
amount of information to
process. The database should include, at a minimum, the date of
the document, the
individual from whom the document was obtained, the date
obtained, a brief
description, and the subject to whom the document pertains.
Chronologies
A chronology of events should be commenced early in the case
in order to establish the
chain of events leading to the proof. The chronology might or
might not be made a part of
the formal investigation report; at a minimum, it can be used for
analysis of the case and
placed in a working paper binder. Keep the chronology brief
114. and include only information
necessary to prove the case. Making the chronology too detailed
can defeat its purpose. The
chronology should be revised as necessary, adding new
information and deleting that which
is irrelevant.
To-Do Lists
Another indispensable aid is the “to-do” list. The list, which
must be updated frequently,
should be kept in a manner that allows it to be easily modified
and used as a cumulative
record of investigation tasks. In a very complex case, the list
can be broken into long-and
short-term objectives: that which must be done eventually (e.g.,
prove elements of a
particular count) and that which should be done tomorrow (e.g.,
conduct an interview or
372
373
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
115. /4/[email protected]:0 18/21
draft a subpoena). No matter how organized an examiner might
be, some list of this nature
must be kept, lest important points be forgotten during the
lengthy investigation.
Using Computer Software to Organize Documents and Other
Data
Computers are one of the most valuable tools for fraud
investigators. In complex fraud
cases, the amount of information to be examined can be
enormous. Performed manually, an
investigation of a complicated fraud scheme could become
overwhelming, requiring so
much time and effort that it might cease to be cost-effective.
Use of a computer
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 19/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
database, however, enables investigators to easily store and
116. access pertinent information
about the case and the documents that have been assembled.
Special software can also be
used to sort, chart, and graph the information in the database,
making it easier to analyze
relationships and identify anomalies. The following are a few of
the software programs
commonly used for case management and reporting:
• i2 Analyst’s Notebook
• CaseMap by CaseSoft
• NetMap by Alta Analytics
• MAGNUM Case Management Software
• Watson and PowerCase from XANALYS
SOURCES OF INFORMATION
A vast variety of information sources is available to the fraud
examiner to assist in:
• Locating individuals or verifying their identity
• Researching assets or financial positions
• Documenting lifestyles and background information
• Discovering banking/creditor relationships
117. • Identifying business affiliations/associates
• Uncovering litigation history
In-House Sources
Some of the most useful information comes from within a
subject’s employing organization.
If an investigator can gain access to a company’s records, he
can learn a great deal about an
individual by examining routine in-house information on file.
In-house sources include:
• Personnel files
• Internal phone records and voice mail
• Computer files and records
• Physical files and records
• Timesheets
• Financial records
• Prior audit or investigative files
373
374
4/10/2018 Bookshelf Online: Principles of Fraud
118. https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 20/21
• Corporate policies and procedures
• Company communications to employees
• Access codes and user identification codes
• Security videos
Public Information
Of all the information available, public records can be one of
the most encompassing,
challenging, and rewarding sources for an investigator. Public
records are those records
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 21/21
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
374
375
119. 4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 1/15
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
the same individual, whom he knew as Randy Trait, had made
three other purchases that
Charles had considered to be somewhat odd in that Randy asked
that the items be held for
pickup by him rather than be delivered to the plant. He provided
copies of these invoices,
which showed the purchase of a notebook computer, an LCD
computer screen, and a digital
camcorder.
When these invoices were compared with the plant purchasing
records, it was found that
the files contained only copies, rather than original invoices, for
all three purchases. Each of
the file copies reflected the same invoice number, date, and
amount as the original invoice,
120. but differed as to what was purchased. All three purchases had
been made using the same
purchase card as the portable DVD player and had been
approved by the director of
purchasing, Robert Morton.
Based on this initial information, a complete review was
conducted of all purchases made
on the card issued to Randall Trait, the senior buyer, for the
past eighteen months, the
period of time he had been employed by Rockside.
Body
This part of the report identifies the employee(s) and other
individuals implicated or
involved in the matter. This includes any background
information that might have been
obtained about the employee or other parties.
EXAMPLE
Subject Employee #1
Robert Morton
Position: Rockside Industries Director of Purchasing
Work Location: Wayside Plant
121. Employment Dates: March 19, 1995 to May 21, 2010
Subject Employee #2
Randall Trait
Position: Senior Buyer
Work Location: Wayside Plant
Employment Dates: November 2, 2008 to May 21, 2010
Nonsubject Employee #1
Phil Brothers
Position: Shipper-Receiver
384
385
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 2/15
Work Location: Wayside Plant
Employment Dates: April 11, 1997 to Current
Nonsubject Employee #2
Stanley Lampen
122. Position: Senior Buyer
Work Location: Wayside Plant
Employment Dates: February 28, 1997–October 15, 2008
Noncompany Witness #1
Charles Front
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 3/15
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this
book may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
Owner/Manager ABLE Tech
Approved Vendor Since June 12, 2005
The body of the report also details the methods used to
investigate the matter, including any
document reviews, interviews, and other procedures such as
video surveillance. If
necessary, background information can be provided on the
department or process involved
123. in the investigation. For example, in an accounts payable fraud,
the document flow might be
described or set out in a graphic to assist the reader in
understanding how the process
works.
EXAMPLE
The Wayside Plant Purchasing Department consists of a senior
buyer, two junior buyers,
and an administrative assistant. These individuals are
responsible for all Wayside plant
purchases not related to travel/entertainment expenses.
The director of purchasing also works out of the Wayside plant;
he is responsible for
supervising the purchasing departments of the eight plants
located across North America.
Purchase cards are used for individual items with a value of
$1,000 or less and purchases of
multiple items with a total value of $5,000 or less (before
taxes). All other purchases are
invoiced and are paid for using corporate checks.
Procedures
1. A purchase requisition form is prepared by an employee and
forwarded to the buyer.
124. 2. The buyer sources goods and makes the purchase.
3. The buyer enters the purchase into the ATAC purchasing
system.
4. The goods are shipped to the plant and received in the
shipping-receiving department.
5. The shipping-receiving department enters the receipt into the
ATAC system.
6. The accounts payable department receives notice of the
purchase through the ATAC
system and the purchase card online statement. Notice of
delivery of the goods is also
received through the ATAC system.
7. The purchasing director receives and approves a monthly
report from the accounts
payable department detailing all purchases made on purchase
cards.
Results
385
386
4/10/2018 Bookshelf Online: Principles of Fraud
125. https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 4/15
This section will vary widely depending on the nature of the
investigation and the
information collected. An investigation that involves only one
incident may be explained in
a sentence or two. In more complicated or extensive
investigations, the narrative may be
supplemented by spreadsheets or graphics.
EXAMPLE
A review was conducted of all purchases made with the
purchase card issued to Randall
Trait, senior buyer, since he commenced employment with
Rockside Industries on
November 2, 2008.
This review identified forty-seven transactions, totaling
$39,864.36, that had altered
documentation supporting the transaction. Each purchase had
been made following the
proper procedures, except that instead of being shipped to the
shipping-receiving
department, the purchases were picked up at source by Randall
Trait. The purchases were
126. 4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 5/15
PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
entered into the ATAC system as being received using the
employee number of Phil
Brothers, a shipping-receiving department employee. Brothers
was unable to verify
whether he made any of the entries, but attendance records
confirmed that on seven of the
days on which shipments were entered into the ATAC system,
Brothers was listed as being
absent from work.
These forty-seven transactions are contained in the spreadsheet
at Tab 1.
The documentation for each of the transactions is located in
Tabs 13–59:
1. Invoice from the accounts payable file
2. Invoice from the approved vendor
127. 3. ATAC system printout showing the purchase being made
4. ATAC system printout showing the purchase being received
5. Monthly report from accounts payable signed by Robert
Morton
(Note: No purchase requisition forms were located for any of
the forty-seven transactions.)
In addition, the review uncovered an additional 113
transactions, totaling $63,511.53, that
also had altered documentation. These transactions were made
using a second purchase
card that had originally been issued to Stanley Lampen, the
buyer whom Randall Trait had
replaced. This card had never been canceled or reissued to
another employee when
Lampen left Rockside’s employment. These 113 transactions are
contained in the
spreadsheet at Tab 2. The documentation for each of the
transactions is located in Tabs 60–
172:
1. Invoice from the Accounts Payable file
2. Invoice from the approved vendor
3. ATAC system printout showing the purchase being made
128. 4. ATAC system printout showing the purchase being received
5. Monthly report from Accounts Payable signed by Robert
Morton
(Note: No purchase requisitions forms were located for any of
the 113 transactions.)
In interviews conducted by corporate security, Robert Morton
and Randall Trait admitted to
making fraudulent purchases using the two purchase cards. Both
denied that there were
any transactions other than those identified in this report.
386
387
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 6/15
Morton admitted that he came up with the idea when Stanley
Lampen left the company and
his purchase card was never canceled. When Morton obtained a
new purchase card for
Trait, he also kept Lampen’s old card.
Both Morton and Trait admitted that they were childhood
129. friends, and confirmed that it was
Morton who had contacted Trait when the buyer’s position had
opened up. They both also
admitted that they had devised the scheme to help out Morton
when he got divorced and
was having financial difficulties.
When presenting information in spreadsheet form, it might be
useful to prepare several
versions with the data sorted in different ways—for example, by
transaction date or
amount. If there are several different types of transactions, they
may be grouped by type in
this manner as well. To supplement the spreadsheet, a written
description of a
representative sample of the transactions can be given.
Generally, it is not necessary to give
a written description of each individual transaction, particularly
when they are essentially
the same except for time, date, and amount.
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 7/15
130. PRINTED BY: [email protected] Printing is for personal,
private use only. No part of this book
may be reproduced or transmitted without publisher's prior
permission. Violators will be prosecuted.
Follow-Up/Recommendations
This section identifies any investigation procedures that remain
outstanding, usually
because they are outside the mandate of the investigator. These
might include the recovery
of property that is in the hands of third parties or collection of
information held by
vendors/suppliers.
It is also the appropriate place to identify and make any
recommendations related to
procedures and controls.
EXAMPLE
1. Purchase requisition forms: These forms are currently
prepared by hand and sent to
the buyer making the purchase. After the purchase is made, they
are kept by the buyer.
Recommendation: A copy of the form should be sent to the
accounts payable
department, which should keep a copy and send a copy back to
131. the employee requesting
the purchase. This would allow for independent confirmation
that the employee had
actually requested the purchase.
2. Receiving goods: All shipments received by the shipping-
receiving department are
entered into the ATAC system using the employee number of
the shipper-receiver. This
number is known to numerous employees outside of this
department. This was done to
allow temporary employees to enter shipments into ATAC. In
addition, these entries can
be made from any computer terminal in the Wayside plant, not
only the shipping-
receiving terminal.
Recommendation: All goods received should be entered into the
ATAC using the shipping-
receiving department only. Passwords should be required to
prevent unauthorized
employees from making entries.
Opinions or Conclusions in Report
Other than opinions on technical matters, no opinions of any
kind should be included in the
132. written report. If conclusions are not self-evident, then the
examiner has usually not
completed a good report. In particular, opinions should not be
given regarding the guilt or
innocence of any person or party.
SUMMARY
387
388
4/10/2018 Bookshelf Online: Principles of Fraud
https://online.vitalsource.com/#/books/9781118233566/cfi/6/32!
/4/[email protected]:0 8/15
The need for an internal investigation can arise in a number of
circumstances, including
determining the source of and losses from an alleged fraud,
complying with federal statutes,
fulfilling the professional duties of loyalty and reasonable care,
ensuring against allegations
of wrongful termination, and mitigating the company’s liability
related to employee
misconduct.
133. When planning a fraud examination, it is important to consider
how the company can carry
out the investigation in the most efficient, effective manner.
The investigation team should
be limited to only those persons who are vital to the fraud
examination process, and may
consist of certified fraud examiners, legal counsel, auditors,
security personnel, IT and
computer forensics experts, human resources personnel,
management representatives, and
outside consultants.
The purpose of the investigation process is to gather evidence to
prove or disprove the
allegations of fraud. As part of the engagement, the fraud
examiner may utilize a variety of
investigative techniques such as undertaking covert and
surveillance operations, using
informants, “dumpster-diving,” acquiring subpoenas and search
warrants, and obtaining
voluntary consent.
Once evidence has been gathered, the investigator must take
care to properly preserve the
evidence to ensure its admissibility in a court of law. This
involves making a formal record