Forensic and Investigative Accounting Chapter 9 Proper Evidence Management © 2013 CCH Incorporated. All Rights Reserved. 4025 W. Peterson Ave. Chicago,

Slides:



Advertisements
Similar presentations
Forensic and Investigative Accounting Evidence: Litigation Services and the Accountant C Delano Gray
Advertisements

BUS VIDEO RECORDINGS COLLECTION – PROCESSING - REDACTION - SHARING WHAT IS RIGHT FOR YOUR DISTRICT?
Q UINCY COLLEGE Paralegal Studies Program Paralegal Studies Program Interviewing & Investigation Foundations of Investigating.
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
COEN 252 Computer Forensics
E-Discovery for System Administrators Russell M. Shumway.
Evidence Collection & Admissibility Computer Forensics BACS 371.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Guide to Computer Forensics and Investigations, Second Edition
Legal Issues Computer Forensics COEN 252 Drama in Soviet Court. Post-Stalin (1955). Painted by Solodovnikov. Oil on Canvas, 110 x 130 cm.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Three: Forms of Evidence This multimedia product and its contents are protected under copyright.
1 Chapter 16 The Crime scene The Crime scene Chain of Custody Chain of Custody Fingerprints and Trace Evidence Fingerprints and Trace Evidence.
Developing a Records & Information Retention & Disposition Program:
CJ227 Criminal Procedure Welcome to our Seminar!!! (We will begin shortly) Tonight – Unit 4 (Chapter 9 – Pretrial Motions, Hearings and Pleas) (Chapter.
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
1 Record Management Medical Center Administrative Group Fall Symposium November 15, 2000 University Audit.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Chapter 17 Videotapes, Photographs, Documents, and Writings as Evidence.
Fraud Examination Evidence I: Physical, Documentary, and Observational Evidence McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
Security+ All-In-One Edition Chapter 20 – Forensics Brian E. Brzezicki.
COEN 252 Computer Forensics
New Data Regulation Law 201 CMR TJX Video.
CYBER FORENSICS PRESENTER: JACO VENTER. CYBER FORENSICS - AGENDA Dealing with electronic evidence – Non or Cyber Experts Forensic Imaging / Forensic Application.
Guide to Computer Forensics and Investigations, Second Edition
HIPAA PRIVACY AND SECURITY AWARENESS.
7 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 7 Audit Planning and Documentation.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Module 9 Configuring Messaging Policy and Compliance.
Discussion Peggy Beeley, MD 2/11/14 Mitigating Medical Malpractice Risks Through Documentation.
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Basic Evidence and Trial Procedure. Opening Statement  Preview the evidence “The evidence will show”  Introduce theme  Briefly describe the issues,
The Trial Process and the Investigator as a Witness.
Module 13: Computer Investigations Introduction Digital Evidence Preserving Evidence Analysis of Digital Evidence Writing Investigative Reports Proven.
1J. M. Kizza - Ethical And Social Issues Module 13: Computer Investigations Introduction Introduction Digital Evidence Digital Evidence Preserving Evidence.
Chapter Three Confidentiality In this chapter, you will learn about: Basic principles of confidentiality The attorney-client privilege and the difference.
Evidence in Court Holy Trinity Law Audrius Stonkus.
1 PRESENTATION OF EVIDENCE Learning Domain PURPOSE FOR THE RULES OF EVIDENCE Protect the jury from seeing or hearing evidence that is: (w/b p. 1-3)
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Legal aspects of forensics. Civil Law private law ◦ Regulates noncriminal relationships between individuals, businesses, agency of government, and other.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
© 2010 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
“ Copyright © Allyn & Bacon 2008 Criminal Evidence Chapter Twelve: Documentary and Scientific Evidence This multimedia product and its contents are protected.
Chapter 8 Auditing in an E-commerce Environment
TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.
CITY OF PHOENIX RECORDS MANAGEMENT AND E-PRIVACY Margie Pleggenkuhle City Clerk Department March 18, 2004.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
CJ227: Criminal Procedure Unit 6 Seminar Mary K Cronin.
PA 230 Unit 1, Lecture 2: Jeopardy PA 230 Jeopardy Class Rules Confidentiality E-Courthouse Paperless Tech in Law Firm Q $100 Q $200 Q $300 Q $400 Q.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Chapter 7: Investigating Theft Acts
All rights Reserved Cengage/NGL/South-Western © 2016.
Forensic and Investigative Accounting
CHAPTER 7 Audit Planning and Documentation
Chapter 3: IRS and FTC Data Security Rules
Red Flags Rule An Introduction County College of Morris
Principles of Evidence
Chapter 17 Videotapes Photographs Documents Writings.
Evidence in an Electronic Age – What is admissible?
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Good Spirit School Division
Presentation transcript:

Forensic and Investigative Accounting Chapter 9 Proper Evidence Management © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave. Chicago, IL CCHGroup.com

Chapter 9Forensic and Investigative Accounting2 Rules of Evidence The rules of evidence are the rules governing the admissibility of evidence in a legal proceeding and the weight to be given to evidence that is admitted.

Chapter 9Forensic and Investigative Accounting3 What Is Evidence? Evidence is testimony, writings, and material objects offered to prove an alleged fact or proposition. Evidence is testimony, writings, and material objects offered to prove an alleged fact or proposition. Direct evidence is evidence that directly proves a fact at issue, without the need for any inference or presumption. Direct evidence is evidence that directly proves a fact at issue, without the need for any inference or presumption. Circumstantial evidence is evidence from which a fact at issue may be proved indirectly (e.g., Casey Anthony’s trial). Circumstantial evidence is evidence from which a fact at issue may be proved indirectly (e.g., Casey Anthony’s trial).

Chapter 9Forensic and Investigative Accounting4 Relevance Requirement Circumstantial evidence. Circumstantial evidence. Inflammatory evidence. Inflammatory evidence. Evidence about plaintiff’s character. Evidence about plaintiff’s character. Evidence of habit. Evidence of habit. Exclusionary rules. Exclusionary rules. Evidence of liability. Evidence of liability.

Chapter 9Forensic and Investigative Accounting5 Privileged Communications Attorney-client privilege. Attorney-client privilege. –Employee communications. –Work product rule. –Attorney-requested accounting work. Medical privilege. Medical privilege. Spousal privilege. Spousal privilege. Other types. Other types. –Religious. –Governmental.

Chapter 9Forensic and Investigative Accounting6 Hearsay Rule Hearsay is an oral or written assertion, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. Hearsay is an oral or written assertion, other than one made by the declarant while testifying at the trial or hearing, offered in evidence to prove the truth of the matter asserted. As a general rule, hearsay is not admissible as evidence in a legal proceeding (except by an expert witness). As a general rule, hearsay is not admissible as evidence in a legal proceeding (except by an expert witness). (continued on next slide)

Chapter 9Forensic and Investigative Accounting7 Hearsay Rule In some situations a statement that appears to be hearsay is offered to prove a fact other than the matter asserted: –Legally operative fact. –Effect on the listener. –State of mind of the declarant. –Impeachment. (continued on next slide)

Chapter 9Forensic and Investigative Accounting8 Hearsay Rule There are three concepts underlying the exceptions to the general rule barring hearsay: –Trustworthiness. –Unavailability of the declarant. –Practical considerations.

Chapter 9Forensic and Investigative Accounting9 Authentication Requirement To be admissible as evidence in a legal proceeding, a document or other material usually must be authenticated or identified as to what its proponent claims it to be.

Chapter 9Forensic and Investigative Accounting10 Best Evidence Rule Under the best evidence rule (also referred to as the original writing rule), to prove the contents of a writing, recording, or photograph, the original writing, recording, or photograph usually must be presented. Under the best evidence rule (also referred to as the original writing rule), to prove the contents of a writing, recording, or photograph, the original writing, recording, or photograph usually must be presented. Attorneys can get around this rule. Attorneys can get around this rule.

Chapter 9Forensic and Investigative Accounting11 Demonstrative Evidence Demonstrative evidence is an item that illustrates testimony but has no probative value in itself (such as a chart, diagram, photograph, video, or model).

Chapter 9Forensic and Investigative Accounting12 Special Rules Criminal cases. Criminal cases. Administrative proceedings. Administrative proceedings. –Tone of the proceedings. –Residuum rule.

Chapter 9Forensic and Investigative Accounting13 Residuum Rule The residuum rule is that no finding may be supported solely by hearsay evidence.

Chapter 9Forensic and Investigative Accounting14 Maximizing Client Confidentiality Michael Mostek, in Expert Witnessing in Forensic Accounting, provides the following advice for protecting the work product privilege: –The attorney should directly retain the consultant. –The agreement should be between attorney and expert. –The expert should obtain facts through, or at the direction of, the attorney. –The investigation should be done at the direction of the attorney. –The attorney should be present when the consultant first meets with the client.

Chapter 9Forensic and Investigative Accounting TTI Top 10 Technology Initiatives, U. S. 1. Managing and retaining data 2. Securing the IT environment 3. Managing IT risks and compliance 4. Ensuring privacy 5. Managing system implementation 6. Preventing and responding to computer fraud 7. Enabling decision support and analytics 8. Governing and managing IT investment and spending 9. Leveraging emerging technologies 10. Managing vendors and service providers

Chapter 9Forensic and Investigative Accounting16 Using Technology to Gather Evidence Drill-down functionality. Drill-down functionality. Electronic imaging. Electronic imaging. Benford’s law. Benford’s law. Digital Analysis Tests and Statistics (DATAS). Digital Analysis Tests and Statistics (DATAS). Data warehousing/mining. Data warehousing/mining. Data extraction versus data investigation. Inductive vs. deductive method. Inductive vs. deductive method.

Chapter 9Forensic and Investigative Accounting17 Computer Evidence Protecting data in hardware seizures. Protecting data in hardware seizures. Insidious s. Insidious s. Documenting computer evidence. Documenting computer evidence.

Chapter 9Forensic and Investigative Accounting18 Evidence Management Do not mark, staple, or otherwise alter any documents or other evidence that might find its way into court. Do not mark, staple, or otherwise alter any documents or other evidence that might find its way into court. Record how the documents were obtained and who has handled it (chain of custody). Record how the documents were obtained and who has handled it (chain of custody). Use see-through holders to avoid putting fingerprints on documents. Use see-through holders to avoid putting fingerprints on documents. (continued on next slide)

Chapter 9Forensic and Investigative Accounting19 Evidence Management Store original documents and working papers in fireproof safes or locked cabinets. Store original documents and working papers in fireproof safes or locked cabinets. Protect material stored on a computer with a password. Protect material stored on a computer with a password. Make backup copies on a regular basis and store in a separate location. Make backup copies on a regular basis and store in a separate location. Copy, inventory, and index evidence so that it can be readily found when needed. Copy, inventory, and index evidence so that it can be readily found when needed.

Chapter 9Forensic and Investigative Accounting20 Questioned Documents Invoices and other documents may be fake or altered when: Font sizes or types are not consistent. Font sizes or types are not consistent. No address is shown for the vendor or customer; this situation is especially suspicious if a vendor has not identified an address to which a check can be sent. No address is shown for the vendor or customer; this situation is especially suspicious if a vendor has not identified an address to which a check can be sent. The document has no identifying numbers such as invoice number, purchase order number, or customer number. The document has no identifying numbers such as invoice number, purchase order number, or customer number. (continued on next slide)

Chapter 9Forensic and Investigative Accounting21 Questioned Documents All invoice numbers on invoices from vendors are numbered sequentially, with no numbers skipped. All invoice numbers on invoices from vendors are numbered sequentially, with no numbers skipped. No tax is shown for taxable items. No tax is shown for taxable items. No shipping or freight cost is shown for items that would have been shipped at the purchaser’s expense. No shipping or freight cost is shown for items that would have been shipped at the purchaser’s expense. Little or no detail is provided on the invoice or document. Little or no detail is provided on the invoice or document.

Chapter 9Forensic and Investigative Accounting22 Forensic Accounting Investigations “In today’s internal forensic accounting investigations, massive amounts of electronic data, transactional detail, electronic communications and historic reports comprise the full universe of information that is typically available to the forensic team to perform the fact finding and corresponding analysis of the investigation. Dealing with this enormous amount of data is time consuming, challenging and costly. However, when you add the complexity associated with a growing number of electronic data types, password cracking and restoration of information on historical media (e.g., backup tapes), the challenges of accessing the relevant information are even more difficult.” Source: Matthew Greenblatt and Stephen O’Mally, “Inside an Internal Accounting Investigation,” New York Law Journal, May 29, 2007.

Chapter 9Forensic and Investigative Accounting23 Computer Online Forensic Extractor Forensic accountants may be able to make use of evidence obtained by law enforcement officers by a free Microsoft device called Computer Online Forensic Extractor (COFEE). The COFEE device is installed on a USB flash drive or other external disk drive to gather digital evidence. The digital forensic tool contains 150 commands that can dramatically reduce the time it takes to gather digital evidence by decrypting passwords and analyzing a computer’s Internet activity as well as data stored in the computer. The investigator does not have to seize the computer, which would involve disconnecting from the network, turning off the power, and possibly losing data. Essentially the investigator scans for evidence on site with a pre-configured COFEE device by inserting the USB device into the suspected computer.

Chapter 9Forensic and Investigative Accounting24 Other Digital Multifunctional Devices Forensic accountants can obtain evidence from other digital multifunctional devices (MFDs). For example, digital copiers store thousands of records in internal memory when documents are copied, printed, scanned, and faxed. Even when the individual walks away from the machine, the information remains in memory. Billions of pages of information also are stored on printers, copiers and facsimile. Forensic auditors should conduct an inventory of data storage devices that may contain appropriate evidence.