Investigating Corporate Fraud
In 1998 Gower published the highly successful third edition of Corporate Fraud by Michael Comer. Sadly, the need for such books has not disappeared - if anything it has increased - with cases such as Enron, WorldCom and the Allied Irish Bank and so this volume concentrates on the practicalities of investigating and recovering from fraud. Fraud can be prevented by secure processes and by ensuring that people allowed access to them are honest. This is easier said than done; failures will occur and every company needs contingency plans as a safety net. Contrary to popular belief, corporate fraud happens to good companies and effective managers. What is crucial is your reaction when suspicions are first aroused - fraud changes from a problem to a disaster mainly because people's initial response is ineffective. This book is a comprehensive action plan for organizations that are victims of corporate fraud. The aim is to help make sure that you can react swiftly and effectively, recover your money, your costs with interest and punish the offenders so that a deterrent is established for others. Most importantly the book will help you return to normal working as quickly as possible. It is highly practical, featuring checklists and case examples throughout. Applying his extraordinary experience, keen insight and vast practical knowledge, Mike Comer is able to take a unique position in showing organizations what they can do and what their rights are. His writing style is entertaining and enlightening - this is no dry, laborious and incomprehensible legal reference. You will find Investigating Corporate Fraud a fascinating and invaluable source of practical expert guidance on a subject strewn with potential dangers.
What people are saying - Write a review
We haven't found any reviews in the usual places.
The Criminal and Civil Law in England
Essential Aspects of Investigations
Essential Planning and Policy Areas
The First Step
Preparation of Schedules
Example of an I2 Chart
accounts alert the suspects appropriate asked auditors bank call logging camouflage passport chattering classes Check civil action claim closed-circuit television communications company’s Computer forensic conﬁdential Consider copies corporate fraud court Covert search Planning crime Criminal Records Bureau crooks Data Protection Act diary of events difﬁcult disclosure dishonesty documents employee established example expert external auditors ﬁdelity insurer ﬁle ﬁnd ﬁrms ﬁrst forensic fraud investigations fraud policy fraud theory guilty human rights important interception Internal Planning Stage interviewer investigations plan investigatory involved lawyers legal action manager money laundering obtain offence ofﬁce OFFSHORE FINANCIAL CENTRES person personal computers police possible potential pretext procedures professional project team Proof of Evidence public authorities questions recover recovery responsible result schedules search Planning Stage Settlor speciﬁc statement subrogation surveillance suspicions Table Telegraphy telephone third parties Transactional Analysis Trash search truth usually victim witness