Forensic and Investigative Accounting

Slides:



Advertisements
Similar presentations
Presenter’s Name June 17, 2003 WMD HAZMAT Evidence Collection Course CBRNE/HAZMAT Evidence Collection Steps 5-8.
Advertisements

Forensic and Investigative Accounting Evidence: Litigation Services and the Accountant C Delano Gray
Chapter 8.  A civil action relates to an act or omission that infringes the rights of a person, group or government instrumentality and seeks to return.
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation Foundations of Investigating.
COEN 252 Computer Forensics
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Litigation and Procedure Discovery: Overview and Interrogatories Litigation and Procedure.
L.A. 310 – DISCOVERY PART II. Depositions C.C.P section 2025 Defined: Oral testimony taken (usually prior to trial) which is: –Under oath –Before a certified.
Evidence Collection & Admissibility Computer Forensics BACS 371.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Three: Forms of Evidence This multimedia product and its contents are protected under copyright.
1 Chapter 16 The Crime scene The Crime scene Chain of Custody Chain of Custody Fingerprints and Trace Evidence Fingerprints and Trace Evidence.
CJ227 Criminal Procedure Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 4 (Chapter 9 – Pretrial Motions, Hearings and Pleas) (Chapter.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Writings and Authentication. Writing defined: FRE 1001(1) Evid. Code § 250 See also FRE (2)-(4)(defines photos, original and duplicate) and Evid. Code.
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
Rules of Discovery and Privileged Communications Court Systems and Practices.
Computer Forensics Principles and Practices
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Basic Evidence and Trial Procedure. Opening Statement  Preview the evidence “The evidence will show”  Introduce theme  Briefly describe the issues,
The Trial Process and the Investigator as a Witness.
Medical Law and Ethics, Third Edition Bonnie F. Fremgen Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
Mon. Nov. 26. Work Product “Privilege” A witness, X, who is friendly to the D was interviewed by P’s attorney and a statement was drawn up Is there any.
Forensic and Investigative Accounting Chapter 9 Proper Evidence Management © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago,
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
1 PRESENTATION OF EVIDENCE Learning Domain PURPOSE FOR THE RULES OF EVIDENCE Protect the jury from seeing or hearing evidence that is: (w/b p. 1-3)
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Fool me twice… Shame on Me Metro Toronto Convention Centre February 2, 2010.
Amendments of the Indian Evidence Act, 1872 Neeraj Aarora Advocate FICWA, LLB, MBA (IT), PGD (Cyber Law, DLTA & ADR), CFE (USA), BCFE (USA) Empanelled.
CJ305 Criminal Evidence Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 9 (Chapter 12 – Documents and the Right of Discovery) (Chapter.
PROCEDURES IN THE JUSTICE SYSTEM, 8 th ed. Roberson, Wallace, and Stuckey PRENTICE HALL ©2007 Pearson Education, Inc. Upper Saddle River, NJ
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
CIT 180 Security Fundamentals Computer Forensics.
HEARSAY! BY MICHAEL JOHNSON. COMMON LAW DEFINITION “ An out-of-court statement offered to prove the truth of the matter asserted”
CJ227: Criminal Procedure Unit 6 Seminar Mary K Cronin.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Outline of the U.S. and Arizona Criminal Justice Systems
Chapter 7: Investigating Theft Acts
Tues., Nov. 11.
All rights Reserved Cengage/NGL/South-Western © 2016.
Chapter Seven Interviewing and Investigation
Civil Pre-Trial Procedures
Internal and Governmental Financial Auditing and Operational Auditing
Civil Pre-Trial Procedures
Law of Evidence OPINION EVIDENCE 2/12/2014 Chapter 8.
Criminal Evidence Marjie Britz Chapter Ten: Hearsay
Chapter Sixteen Rules of Evidence  .
Hearsay Hector Brolo Evidence, Law 16 Spring 2017.
J. Max Wawrik Nancy Rosado Colon Law 16 Spring 2017
AGENDA Brief Lecture on Chapters courtroom evidence and jury selections and juries Film, 12 angry men Written exercise
Forensic and Investigative Accounting
EVIDENCE—BASES OF OPINION TESTIMONY BY EXPERTS
HEARSAY DEFINITIONS [RULE 801, PARED DOWN].
EVIDENCE Evidence must be relevant to the facts and issues of the case
TRIAL: BURDEN OF PROOF AND EVIDENCE
OBJECTIONS.
Principles of Evidence
TIPS FOR IMPROVING THE EFFECTIVENESS OF YOUR DEPOSITIONS
Objections Criminal law – unit #3.
Chapter 17 Videotapes Photographs Documents Writings.
EVIDENCE—BASES OF OPINION TESTIMONY BY EXPERTS
Evidence in an Electronic Age – What is admissible?
Rules of Discovery and Privileged Communications
Good Spirit School Division
What is a Privilege? A privilege is a relationship between a witness and the subject of potential testimony (whether that subject be a person or something.
CGSB and Electronic Records
CHAP. 13: AUTHENTICATION P. JANICKE 2010.
The Investigator and The Legal System
Welcome to Forensic Science!
Presentation transcript:

Forensic and Investigative Accounting Chapter 9 Proper Evidence Management © 2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.com

Forensic and Investigative Accounting Rules of Evidence The rules of evidence are the rules governing the admissibility of evidence in a legal proceeding and the weight to be given to evidence that is admitted. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting What Is Evidence? Evidence is testimony, writings, and material objects offered to prove an alleged fact or proposition. Direct evidence is evidence that directly proves a fact at issue, without the need for any inference or presumption. Circumstantial evidence is evidence from which a fact at issue may be proved indirectly. Chapter 9 Forensic and Investigative Accounting

Relevance Requirement Circumstantial evidence. Inflammatory evidence. Evidence about plaintiff’s character. Evidence of habit. Exclusionary rules. Evidence of liability. Chapter 9 Forensic and Investigative Accounting

Privileged Communications Attorney-client privilege. Employee communications. Work product rule. Attorney-requested accounting work. Medical privilege. Spousal privilege. Other types. Religious. Governmental. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Hearsay Rule Hearsay is an oral or written assertion, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. As a general rule, hearsay is not admissible as evidence in a legal proceeding (except by an expert witness). (continued on next slide) Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Hearsay Rule In some situations a statement that appears to be hearsay is offered to prove a fact other than the matter asserted: Legally operative fact. Effect on the listener. State of mind of the declarant. Impeachment. (continued on next slide) Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Hearsay Rule There are three concepts underlying the exceptions to the general rule barring hearsay: Trustworthiness. Unavailability of the declarant. Practical considerations. Chapter 9 Forensic and Investigative Accounting

Authentication Requirement To be admissible as evidence in a legal proceeding, a document or other material usually must be authenticated or identified as to what its proponent claims it to be. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Best Evidence Rule Under the best evidence rule (also referred to as the original writing rule), to prove the contents of a writing, recording, or photograph, the original writing, recording, or photograph usually must be presented. Attorneys can get around this rule. Chapter 9 Forensic and Investigative Accounting

Demonstrative Evidence Demonstrative evidence is an item that illustrates testimony but has no probative value in itself (such as a chart, diagram, photograph, video, or model). Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Special Rules Criminal cases. Administrative proceedings. Tone of the proceedings. Residuum rule. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Residuum Rule The residuum rule is that no finding may be supported solely by hearsay evidence. Chapter 9 Forensic and Investigative Accounting

Maximizing Client Confidentiality Michael Mostek, in Expert Witnessing in Forensic Accounting, provides the following advice for protecting the work product privilege: The attorney should directly retain the consultant. The agreement should be between attorney and expert. The expert should obtain facts through, or at the direction of, the attorney. The investigation should be done at the direction of the attorney. The attorney should be present when the consultant meets with the client. Chapter 9 Forensic and Investigative Accounting

AICPA Top Technologies Task Force The task force found the following top ten technologies for 2007 in descending order of importance: Information security management. Identity and access management. Conforming to assurance and compliance standards. Privacy management. (continued on next slide) Chapter 9 Forensic and Investigative Accounting

AICPA Top Technologies Task Force Disaster recovery planning (DRP) and business continuity management (BCM). IT governance. Securing and controlling information distribution. Mobile and remote computing. Electronic archiving and data retention. Document, content, and knowledge management. Chapter 9 Forensic and Investigative Accounting

Using Technology to Gather Evidence Drill-down functionality. Electronic imaging. Benford’s law. Digital Analysis Tests and Statistics (DATAS). Data warehousing/mining. Data extraction versus data investigation. Inductive vs. deductive method. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Computer Evidence Protecting data in hardware seizures. Insidious e-mails. Documenting computer evidence. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Evidence Management Do not mark, staple, or otherwise alter any documents or other evidence that might find its way into court. Record how the documents were obtained and who has handled it (chain of custody). Use see-through holders to avoid putting fingerprints on documents. (continued on next slide) Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Evidence Management Store original documents and working papers in fireproof safes or locked cabinets. Protect material stored on a computer with a password. Make backup copies on a regular basis and store in a separate location. Copy, inventory, and index evidence so that it can be readily found when needed. Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Questioned Documents Invoices and other documents may be fake or altered when: Font sizes or types are not consistent. No address is shown for the vendor or customer; this situation is especially suspicious if a vendor has not identified an address to which a check can be sent. The document has no identifying numbers such as invoice number, purchase order number, or customer number. (continued on next slide) Chapter 9 Forensic and Investigative Accounting

Forensic and Investigative Accounting Questioned Documents All invoice numbers on invoices from vendors are numbered sequentially, with no numbers skipped. No tax is shown for taxable items. No shipping or freight cost is shown for items that would have been shipped at the purchaser’s expense. Little or no detail is provided on the invoice or document. Chapter 9 Forensic and Investigative Accounting