SlideShare a Scribd company logo
3/12/2015 n e e r a j a a r o r a 1
By Neeraj Aarora
FCMA, CEH, CCNA, CFCE, LLB, MBA (IT)
 Traditional Auditing fails to unearth financial
irregularities;
 Complex Trade Pattern with Transnational Nature;
 Corporate Frauds in India;
 Enhanced Compliance Requirement;
 Transparency Requirement;
 Risk Management
3/12/2015 3N e e r a j A a r o r a
 Effective Governance
 Compliance
 Third Party Obligations
 Litigation Support
 Investigation
3/12/2015 4N e e r a j A a r o r a
 Forensic Auditor as Expert Witness:
 Section 45 Evidence Act
 Admissibility of Report:
 Admissible Evidence
 Computer Evidence
o Section 65B Evidence Act;
o Section 2 A Bankers Book of Evidence Act.
 Standard Procedures:
 Standards as Benchmark
 Acceptable Practices
3/12/2015 5N e e r a j A a r o r a
 Anvar P.V. Vs. P.K. Basheer and Others
[MANU/SC/0834/2014]
 The Supreme Court held:-
o Original electronic record admissible as primary evidence.
o Certificate U/S 65B Evidence Act shall ensure safeguard as
to the source and the authenticity of the electronic
evidence.
o If no certificate U/S 65B, no expert opinion is not
admissible.
o If no certificate U/S 65B, no oral evidence can be resorted.
3/12/2015 6N e e r a j A a r o r a
Debit &
Credit
Business
Method
Bit & Byte Admissibility
3/12/2015 7N e e r a j A a r o r a
 Multi-Disciplinary Specialization
 Knowledge of Information System Audit like Law,
CISA etc.
 Knowledge of Forensic Audit Process, CFE
 Computer Forensic/Network/Server
 Domain Knowledge/Exposure
3/12/2015 8N e e r a j A a r o r a
 Specific Methodology
 Accounting & Industry Standard
 Legal Framework
 Information System Standard
 Adherence to Standards:-
 Fyre Vs. United States
 Daubert Vs. Merrell Dow Pharmaceuticals
3/12/2015 9N e e r a j A a r o r a
 Define Objective
 Formulation of Strategy
 Discovery
 Understanding Business Process
 Information System Analysis
 Collection of Documentary/Electronic Information
 Analysis
 Finding the Gaps
 Interpretation of Business Transactions
 Systematic Review and appraisal of factors to meet the
objective of the audit
 Reporting
3/12/2015 10N e e r a j A a r o r a
Audit
Law &
Standard
Information
System
Business
Method
Investigation
Analysis
Reporting &
Proving
3/12/2015 11N e e r a j A a r o r a
 Complex Transactions/Process
 Information System Audit/Cyber Forensic/Cloud
Computing.
 Dynamically Changing Technology
 Digital Evidence-Admissibility Issues
 Cross Border Transactions
 Humongous Data/Methods
 Privacy Issues
3/12/2015 12N e e r a j A a r o r a
 In Demand
 Excellent Rewards
 Multinational Firms Vs Domestic Firms
 Expert Witness
3/12/2015 13N e e r a j A a r o r a
•Effec•Effec
 Prevention of Money Laundering (PMLA)
 Central Bureau of Investigation (CBI)
 Enforcement Directorate (ED)
 Serious Fraud investigating Organization (SFIO)
 Economic Offences Wing (EOW)
 SEBI/FMC/Banks/Financial Institutions
 MNCs/Corporate Action
 Courts
3/12/2015 14N e e r a j A a r o r a
E-mails: neeraj@hazenlegal.com
Websites: www.forensicveda.com, www.neerajaarora.com
© HAZEN LEGAL ASSOCIATES, 2013 All Rights Reserved

More Related Content

Viewers also liked

Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj Aarora
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj Aarora
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Ronak Karanpuria
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
Adv Prashant Mali
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
fariez91
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
Chetan Bharadwaj
 
Cyber law
Cyber lawCyber law
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation
Slides | Presentation Design Agency
 

Viewers also liked (13)

Neeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence actNeeraj aarora cyber_lawyer_section 65b_evidence act
Neeraj aarora cyber_lawyer_section 65b_evidence act
 
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenarioNeeraj aarora cyber_lawyer_current trends in cyber crime scenario
Neeraj aarora cyber_lawyer_current trends in cyber crime scenario
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cyber Law
Cyber  LawCyber  Law
Cyber Law
 
An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)An Introduction to Cyber Law - I.T. Act 2000 (India)
An Introduction to Cyber Law - I.T. Act 2000 (India)
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation8 Tips for an Awesome Powerpoint Presentation
8 Tips for an Awesome Powerpoint Presentation
 

Similar to Neeraj aarora cyber_lawyer_forensic audit

Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
Osler, Hoskin & Harcourt LLP
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
Paymetric, Inc.
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
Wilson Kao
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
FraudBusters
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting Systems
Seungjoo Kim
 
Records Management and ediscovery as Risk
Records Management and ediscovery as RiskRecords Management and ediscovery as Risk
Records Management and ediscovery as Risk
MSpadea
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
loglogic
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
emermell
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
Jan Dhont
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
Brian Rowe
 
Blockchain and Competition – TULPULE – June 2018 OECD discussion
Blockchain and Competition – TULPULE – June 2018 OECD discussionBlockchain and Competition – TULPULE – June 2018 OECD discussion
Blockchain and Competition – TULPULE – June 2018 OECD discussion
OECD Directorate for Financial and Enterprise Affairs
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Vivastream
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Vivastream
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
Kartik Mehta
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
Kartik Mehta
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
TrustArc
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
whbrown5
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and Contractors
ButlerRubin
 

Similar to Neeraj aarora cyber_lawyer_forensic audit (20)

Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices Streamlining Document Review & Production: Pitfalls and Best Practices
Streamlining Document Review & Production: Pitfalls and Best Practices
 
From Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data BreachFrom Bad to Worse: How to Stay Protected from a Mega Data Breach
From Bad to Worse: How to Stay Protected from a Mega Data Breach
 
D&B onboard.pdf
D&B onboard.pdfD&B onboard.pdf
D&B onboard.pdf
 
Using Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay FraudUsing Data Analytics to Find and Deter Procure to Pay Fraud
Using Data Analytics to Find and Deter Procure to Pay Fraud
 
Protection Profile for E-Voting Systems
Protection Profile for E-Voting SystemsProtection Profile for E-Voting Systems
Protection Profile for E-Voting Systems
 
Records Management and ediscovery as Risk
Records Management and ediscovery as RiskRecords Management and ediscovery as Risk
Records Management and ediscovery as Risk
 
Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?Logs & The Law: What is Admissible in Court?
Logs & The Law: What is Admissible in Court?
 
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
Making ‘Big Data’ Your Ally – Using data analytics to improve compliance, due...
 
2015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 050520152015-0318 GAC Presentation - BCR - 05052015
2015-0318 GAC Presentation - BCR - 05052015
 
iConference Popovsky
iConference PopovskyiConference Popovsky
iConference Popovsky
 
Blockchain and Competition – TULPULE – June 2018 OECD discussion
Blockchain and Competition – TULPULE – June 2018 OECD discussionBlockchain and Competition – TULPULE – June 2018 OECD discussion
Blockchain and Competition – TULPULE – June 2018 OECD discussion
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
Fighting Fraud and Cyber Crime: WTF ... "Where's the Fraud"
 
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
Workshop E: Fighting Fraud and Cyber Crime: WTF…"Where's the Fraud"
 
Business Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money LaunderingBusiness Intelligence For Anti-Money Laundering
Business Intelligence For Anti-Money Laundering
 
Business Intelligence For Aml
Business Intelligence For AmlBusiness Intelligence For Aml
Business Intelligence For Aml
 
Privacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy ProgramPrivacy Frameworks: The Foundation for Every Privacy Program
Privacy Frameworks: The Foundation for Every Privacy Program
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
Bank Fraud & Data Forensics
Bank Fraud & Data ForensicsBank Fraud & Data Forensics
Bank Fraud & Data Forensics
 
Insider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and ContractorsInsider Breaches and Data Theft by Employees and Contractors
Insider Breaches and Data Theft by Employees and Contractors
 

More from Neeraj Aarora

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
Neeraj Aarora
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
Neeraj Aarora
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
Neeraj Aarora
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
Neeraj Aarora
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
Neeraj Aarora
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
Neeraj Aarora
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
Neeraj Aarora
 

More from Neeraj Aarora (7)

SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence CasesSHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
SHA-1 OFFICIAL DEAD: Authenticity Challenge in Electronic Evidence Cases
 
Current trends in cyber crime scenario
Current trends in cyber crime scenarioCurrent trends in cyber crime scenario
Current trends in cyber crime scenario
 
Blowing the whistle
Blowing the whistleBlowing the whistle
Blowing the whistle
 
State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...State cannot claim sovereign immunity in motor accident cases says delhi high...
State cannot claim sovereign immunity in motor accident cases says delhi high...
 
DOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITYDOCTRINE OF SOVEREIGN IMMUNITY
DOCTRINE OF SOVEREIGN IMMUNITY
 
Forensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert WitnessForensic Accountant: Reliability & admissibility as Expert Witness
Forensic Accountant: Reliability & admissibility as Expert Witness
 
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
It Amendment ActIT Amendment Act, 2008 notified w.e.f. 27/10/2009
 

Neeraj aarora cyber_lawyer_forensic audit

  • 1. 3/12/2015 n e e r a j a a r o r a 1
  • 2. By Neeraj Aarora FCMA, CEH, CCNA, CFCE, LLB, MBA (IT)
  • 3.  Traditional Auditing fails to unearth financial irregularities;  Complex Trade Pattern with Transnational Nature;  Corporate Frauds in India;  Enhanced Compliance Requirement;  Transparency Requirement;  Risk Management 3/12/2015 3N e e r a j A a r o r a
  • 4.  Effective Governance  Compliance  Third Party Obligations  Litigation Support  Investigation 3/12/2015 4N e e r a j A a r o r a
  • 5.  Forensic Auditor as Expert Witness:  Section 45 Evidence Act  Admissibility of Report:  Admissible Evidence  Computer Evidence o Section 65B Evidence Act; o Section 2 A Bankers Book of Evidence Act.  Standard Procedures:  Standards as Benchmark  Acceptable Practices 3/12/2015 5N e e r a j A a r o r a
  • 6.  Anvar P.V. Vs. P.K. Basheer and Others [MANU/SC/0834/2014]  The Supreme Court held:- o Original electronic record admissible as primary evidence. o Certificate U/S 65B Evidence Act shall ensure safeguard as to the source and the authenticity of the electronic evidence. o If no certificate U/S 65B, no expert opinion is not admissible. o If no certificate U/S 65B, no oral evidence can be resorted. 3/12/2015 6N e e r a j A a r o r a
  • 7. Debit & Credit Business Method Bit & Byte Admissibility 3/12/2015 7N e e r a j A a r o r a
  • 8.  Multi-Disciplinary Specialization  Knowledge of Information System Audit like Law, CISA etc.  Knowledge of Forensic Audit Process, CFE  Computer Forensic/Network/Server  Domain Knowledge/Exposure 3/12/2015 8N e e r a j A a r o r a
  • 9.  Specific Methodology  Accounting & Industry Standard  Legal Framework  Information System Standard  Adherence to Standards:-  Fyre Vs. United States  Daubert Vs. Merrell Dow Pharmaceuticals 3/12/2015 9N e e r a j A a r o r a
  • 10.  Define Objective  Formulation of Strategy  Discovery  Understanding Business Process  Information System Analysis  Collection of Documentary/Electronic Information  Analysis  Finding the Gaps  Interpretation of Business Transactions  Systematic Review and appraisal of factors to meet the objective of the audit  Reporting 3/12/2015 10N e e r a j A a r o r a
  • 12.  Complex Transactions/Process  Information System Audit/Cyber Forensic/Cloud Computing.  Dynamically Changing Technology  Digital Evidence-Admissibility Issues  Cross Border Transactions  Humongous Data/Methods  Privacy Issues 3/12/2015 12N e e r a j A a r o r a
  • 13.  In Demand  Excellent Rewards  Multinational Firms Vs Domestic Firms  Expert Witness 3/12/2015 13N e e r a j A a r o r a •Effec•Effec
  • 14.  Prevention of Money Laundering (PMLA)  Central Bureau of Investigation (CBI)  Enforcement Directorate (ED)  Serious Fraud investigating Organization (SFIO)  Economic Offences Wing (EOW)  SEBI/FMC/Banks/Financial Institutions  MNCs/Corporate Action  Courts 3/12/2015 14N e e r a j A a r o r a
  • 15. E-mails: neeraj@hazenlegal.com Websites: www.forensicveda.com, www.neerajaarora.com © HAZEN LEGAL ASSOCIATES, 2013 All Rights Reserved