Course Introduction
Course Content

Action List

The following checklist of actions may guide a person that suspects fraud within the company.

  1. Do not act on emotion. It’s time to gather all the facts.
  2. Alert appropriate management within your organization. This, of course, heavily depends on who’s suspected of committing the fraud. Fraud discovered at the lower echelons of the company can probably be handled by the direct manager in association with the compliance supervisor. Things get a bit more complicated the higher you move up the corporate ladder. Accountability, though, goes straight to the President, CEO and Board of Directors. So, make sure compliance is amply prepared and authorized to do what’s necessary even upon discovery of high-level fraud with the company. 
  3. Document date, time and details of initial report/discovery. This is important for both the reporting of the suspected fraud and ongoing investigation.
  4. Take notes (and/or pictures and video) of all observations and actions. Important information can quickly be forgotten or confused over time. Creating copious notes and/or documenting photographic evidence helps ensure you have all the information the company needs to maintain the integrity of the investigation.  
  5. Maintain confidentiality (only inform those people who need to know about the suspected act). Loose lips sink ships – and investigations. Prematurely alerting the suspect(s) leads to destruction of evidence and cover-ups.
  6. Do not confront the suspect. You could be putting yourself in danger, in addition to undermining the investigation.
  7. Write out in full the suspected act or wrongdoing in as much detail as possible, including:
  8. The alleged occurrence,
  9. Who was involved in the occurrence,
  10. Whether the activity is ongoing,
  11. Location of occurrence,
  12. The value of the loss or potential loss, and
  13. A list of who else may know of the activity.

Corporate investigations can take months and legal ones even longer.

Identify all documentary and other evidence connected to the activity, such as:

  • Invoices,
  • Contract and Agreements,
  • Purchase orders,
  • Checks,
  • Computers,
  • Laptops,
  • Tablets,
  • Cell phones,
  • Cloud access accounts,
  • Credit card statements, and
  • Relevant social media accounts.

Collection of evidence is critical for proving the crime.

  1. Immediately gather the evidence (only if doing so will not alert the suspects) and place it in a secure area. Bear in mind a need to maintain a legitimate chain of evidence in case it becomes necessary to bring in outside authorities.
  2. Protect the evidence from damage or contamination. This includes all confiscated electronic devices. You may need the evidence for civil or criminal proof, or even use it in a countersuit against a litigious fired employee should you need to.
  3. Identify all potential witnesses. This includes people within and without your organization. Certain people may even alternate from witness to suspect and vice-a-versa during the course of your investigation.
  4. If possible, secure and/or remove the suspect’s access to relevant computers and security systems. This decision is delicate and may need to be made at the highest levels of authority within the organization. There’s a fine balance between mitigating damages and continuing to collect evidence. You may want to consult outside legal and accounting firms and request an Opinion Letter regarding your decisions, depending on the situation. 
  5. Ensure regular back-up of all files and secretly place additional security on all accounts the suspect(s) may have access to.
  6. Contact the company’s outside counsel and accountants for advice and recommendations. This should occur early on in the process but, typically, at the highest levels of management.
  7. Contact the company’s insurance carrier. You may or may not be covered for the type of fraud under investigation. Should you be covered, the insurer may have its own processes for conducting investigations and you may unwittingly forfeit certain rights or claims by not alerting them early enough. The insurer, moreover, may try to deny the claim and you might be forced to retain additional counsel to sue your insurer for coverage.
  8. You may need to retain a forensic accountant. Some frauds can be quite elaborate and complex, involve multiple jurisdictions and/or require advanced training in computer programming. A full investigation may require particular expertise.
  9. Continue to monitor suspicious personnel and activities to ascertain the full breadth and extent of the fraud.