WORKPLACE INVESTIGATIONS for June 15, 2010 Presented by: MICHAEL J

Slides:



Advertisements
Similar presentations
Forensic Tools and Techniques for Internal Auditors
Advertisements

/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Chapter Nine: Ethical Issues for Criminal Prosecutors
Northside I.S.D. Acceptable Use Policy
Workplace Investigations: How the Employer Should Do Them and How the Plaintiff Can React to Them Jennifer M. Trulock University of Houston Law Foundation.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
School Law Boot Camp – Part 1.  LEGAL ONE Video LEGAL ONE Video  SMALL GROUP ACTIVITY  ALL GROUPS – ◦ Analyze the Cyberbullying Video Scenario Questions.
Ethical Justice Chapter Six: Ethical Issues for Police Officers & Criminal Investigators.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
FORENSIC ACCOUNTING - BA124 - Fall 2008Slide 7-1 Today’s Topics n Methods for Investigating Fraud n Theft Investigation Methods n Concealment Investigation.
HUMAN RESOURCES ISSUES American University March 9-14, 2003.
Chapter 14: Ethics, Justice and Fair Treatment at Work
 INTRODUCTION  COMPANY PROFILE  RECRUITMENT - MEANING AND DEFINATION - RECRUITMENT PROCESS  SELECTION - MEANING AND DEFINITION - SELECTION PROCESS.
STRATEGIC PLANNING FOR Post-Clearance Audit (PCA)
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
Prepared by: Matt J. McCarthy1 Introduction to Security Chapter 4 Legal and Ethical Considerations.
(Edited) WORKPLACE PRIVACY.
EMPLOYEE TERMINATIONS Becky S. Knutson Davis Brown Law Firm.
WORKPLACE INVESTIGATIONS for June 15, 2010 Presented by: MICHAEL J. SOLTIS CHRISTINA FEENY AND FRANK RUDEWICZ | jacksonlewis.com.
Anti Corruption Investigation and Prosecution Mongolia Roger Smart Stephen Foster.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
A Day in the Life of an Auditor at the Division of State Internal Audit The State Employee Fraud, Waste, and Abuse Hotline.
1 Roles of Legal Professionals Legal Professional –Judges –Attorneys/Lawyers –Paralegals/Legal Assistants –Law Clerks –Legal Secretary –Others.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Copyright © Education Compliance Group, Inc. All rights reserved. By Peggy A. Burns, Esq. and Mark Hinson, SPHR Internal Investigations & Decision-Making:
Computer Forensics Principles and Practices
PREVENTIVE LAW WORKSHOP Investigating Employee Misconduct Mary Elizabeth Kurz, Vice Chancellor and General Counsel Dianne Sortini, Director, Employee Relations.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Presentation to: Presented by: Date: Office of Inspector General Updates Nutrition Services Directors Ondray Jennings, Deputy Inspector General December.
Deloitte Forensic Forensic Technology Conference of Regulatory Officers - CORO November 2012.
DISCRIMINATION, RETALIATION AND THE FEAR OF FIRING Ashley Interrante Scheer Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas, Texas (214)
Session 5 Anti-Money Laundering & Financial Crime Conducting or Supporting the Investigation Process Presented by ERM Institute Monday, 24 February 2014.
Chapter 9 Torts Twomey, Business Law and the Regulatory Environment (14th Ed.)
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Criminal Investigation: An Overview
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
Title of Presentation Technology and the Attorney-Client Relationship: Risks and Opportunities Jay Glunt, Ogletree DeakinsJohn Unice, Covestro LLC Jennifer.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
What Is Police Misconduct? Any action performed by a law enforcement officer that is criminal, unconstitutional, or against established rules, regulations,
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
School Board Policy Draft Bullying and Harassment School Year
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Legal Aspects of Nursing
Privacy and the Law.
Computer Security Fundamentals
PROFESSIONAL LIABILITY & QUALITY CONTROL
BY: NASUMBA KIZITO KWATUKHA
7 Criminal Intelligence and Surveillance Operations.
Chapter 3: Fighting Fraud: An Overview
Digital Forensics in the Corporation
Intergovernmental Affairs
PROTEÇÃO DAS MÃOS: LIÇÕES PARA TODA A VIDA
Theft of Trade Secrets & Economic Espionage
Connections Abuse Prevention Plan 2018.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
CCP 420: FRAUD DETECTION AND MANAGEMENT
Anuj Dube Jimmy Lambert Michael McClendon
Evidence Collection, Tagging and Storage
On-Site Investigations
Presentation transcript:

WORKPLACE INVESTIGATIONS for June 15, 2010 Presented by: MICHAEL J WORKPLACE INVESTIGATIONS for June 15, 2010 Presented by: MICHAEL J. SOLTIS CHRISTINA FEENY AND FRANK RUDEWICZ soltism@jacksonlewis.com | jacksonlewis.com Christina.Feeny@Thomsonreuters.com | Thomsonreuters.com Frudewitcz@dbo.com |bdoconsulting.com

Why Investigate? Duty to Do So Faraghar / Ellerth Kolstad v. ADA Employee Morale

Plaintiff’s Mantra An Incompetent Investigator… Did an Ineffective Investigation Of Course, Reached the Wrong Conclusion What Else Would You Expect?

Credible and Defensible

The Investigative Plan Identify goals and objectives. Prioritize the steps to be taken. Set timetables. Covert versus overt. Choose the appropriate strategies and techniques Digital Forensics, Field Interviews, Database and Internet Research, Surveillance, Sting, Etc.

Investigative Goals & Objectives Developing leads, facts, intelligence and general information: about the issues in dispute going to the credibility of witnesses, potential witnesses and evidence obtaining critical evidence

Investigative Plan Elements of the violation What are elements needed to establish the violation? Legal/criminal Policy Violations Procedural violations Administrative violations Identify the targets of the investigation Suspect known? More than one suspect?

Investigative Plan Assign the appropriate investigator Any improper relationship? Any known bias? Should outside personnel be involved? Conduct interviews/collect facts Ensure confidentiality of process Maintain integrity of evidence and investigation

Investigative Plan Review information and verify Documentation Compare information Identify gaps Documentation Restrict dissemination

Investigative Plan Goals & Objectives Verify the occurrence Rumors? More to the story? Any physical evidence? Is this possible? Identify the alleged violation What exactly occurred? Confirm the allegation or is it another offense?

Investigative Approaches “Quiet” (covert). “Visible” (overt). Transition from quiet to visible inquiries. Public relations.

Tools Available in an Investigation The Client The Law Firm Public Information commercial databases private and proprietary databases public records the Internet

Tools Available in an Investigation People as sources Interviews of witnesses Surveillance Forensics Public relations

Interviews of Witnesses Who may be interviewed? Practical considerations Different approaches for interviews Tape recording interviews Eavesdropping and bugging Demands for payment and other requests Hiring former employees of an adversary

Surveillance During the initial phase of the investigation Covert Dangers inherent in this technique Costs Client Expectations

Digital Forensics Desktop and Laptop Computers Servers Mobile Telephones Blackberry Devices Other Digital and Digital Media Devices Key Stroke Monitors Developing Deleted Material Establishing Downloads and Theft

Forensics Forensic Accounting Fraud Auditing Stings Polygraphs Examinations of Trash

Professional Licenses Retain only licensed investigators – performing investigations without a license is a crime in some states

3 Cs of Investigative Management Competence Corroboration Common Sense

Myriad of Potential Privacy Issues

Searches Desks, Files, Lockers Cars Mail Strip Searches Testing Off-the-Job Conduct Undercover Investigators

Electronic Privacy Issues Quon v. City of Ontario (Awaiting S.Ct. Decision) E-Mail / Internet Issues Eavesdropping Recording Phone Calls Electronic Monitoring Taping

Oh, the Places You Will Go… Causes of Action Involving Investigations

Causes of Action Involving Investigations Invasion of Privacy Constructive Discharge Defamation False Imprisonment Intentional Infliction of Emotional Distress Loss of Consortium And More…

Key Retaliation Cases Relating to Investigations Burlington Northern & Santa Fe Railway Co. v. White (S.Ct 2004) Crawford v. Metropolitan Gov’t of Nashville and Davidson County, TN (S.Ct 2009) Fincher v. Depository Trust and Clearing Corporation, (2d Cir. 2010)

Recent Ethics Cases Relating to Investigations Mohawk Industries v. Carpenter (S.Ct. 2009) Costco Wholesale Corp. v. The Superior Court of LA County (S.Ct. CA 2009) Sandra T.E. v. South Berwyn School District 100 and Sidley Austin LLP (7th Cir. 2010)

Recent Ethics Cases Relating to Investigations In re Whirlpool Corp. (7th Cir. 2010) Speeny et al v. Rutgers, The State University et al (3rd Cir. 2010) Steingart v. Loving Care Agency, Inc. , (S.Ct. NJ 2010)

ANY QUESTIONS? THANK YOU FOR YOUR ATTENTION!