FRAUD EXAMINERS MANUAL INTERNATIONAL EDITION

Similar documents
FRAUD EXAMINERS MANUAL (INTERNATIONAL EDITION)

FRAUD EXAMINERS MANUAL

INTRODUCTION TO FRAUD EXAMINATION

What do they investigate

NABCA 23 rd Annual Administrators Conference The Forensics of Fraud: Conducting Financial Investigations

716 West Ave Austin, TX USA

Fraud Examination. Prevention, Detection, and Investigation. Steven M. Bragg

POLICY: FRAUD PREVENTION. October 2017

HOW TO SPOT AND MITIGATE FRAUDULENT ACTIVITIES

INSURANCE. Forensic services. Helping to protect your business from fraud, misconduct and non-compliance ADVISORY. kpmg.com/in

716 West Ave Austin, TX USA

MAKING CRIME PAY: HOW TO LOCATE HIDDEN ASSETS (NO )

AGA Risk and Fraud Webinar

Eastern Band of Cherokee Indians Fraud Policy

Fraud in Government. Mike Nolan, CPA, CFE, CGMA. CCACC & CCA&RMC Conference Monterey, CA September 2014

11/9/15. Fraud in Non-profit Organizations: What You Need to Know NOW!

Sunera Canada ULC. Effective Fraud Risk Assessment Annual Fraud Program. October 21, 2016

Are your business partners real or a Trojan Horse? Detecting and preventing anonymous shell companies

Table 1: Historical Summary of Revenue Lost to Fraud. Estimate of Revenue Lost to Fraud

ABOUT THE PROGRAMME. The FCPA certification programme consists of 5 papers:

Mitigating Fraud. June 22, Sept. 21, 2014

ANTI-FRAUD CODE CONTENTS INTRODUCTION GOAL CORPORATE REFERENCE FRAMEWORK CONCEPTUAL FRAMEWORK ACTION FRAMEWORK GOVERNANCE STRUCTURE

Digital Marketing Partner Organizer Knowledge Partner. May 26-27, 2017 New Delhi. June 9-10, 2017 Chennai.

Asset Misappropriation. Peter N. Munachewa, CICA, CFIP, CFE

Fraud & Forensic Accounting Update for CPAs

ANTI-BRIBERY POLICY AND ANTI-FRAUD POLICY AND RESPONSE PLAN

Anti-Fraud Policy. Version: 8.0 Approval Status: Approved. Document Owner: Graham Feek. Review Date: 07/12/2018

Describe Fraud in the Context of Financial

MMAAA Annual Meeting. Conducting an Investigative Audit June 13, Presented by: John J. Sullivan, CFE Melanson Heath

IIA Fraud Conference. Case studies from recent investigations. 8 April 2015

Fraud Prevention & Detection. Eric Conforti, CPA, CFE April 17, 2018

Good From The Inside Out. Saturday, April 8, 2017

Forensic Accounting. Ms. Dhir. Forensic Accountant (FoA) #IMASLC17

FRAUD: A Web Of Deceit

An Expensive Problem. Fraud in Government A Growing Problem

REPORT TO THE NATIONS 2018 GLOBAL STUDY ON OCCUPATIONAL FRAUD AND ABUSE

Anti-fraud Policy. 1. Introduction

Fraud Risk Assessment CARRIE KENNEDY, PARTNER DUSTIN BIRASHK, PARTNER

Types of Fraud, Detection and Mitigation Presentation by: Isaac Mutembei Murugu CIA, CISA 23 rd November Uphold public interest

At any given moment, there is a certain percentage of the population that s up to no good. J. Edgar Hoover. Compliance & Ethics Institute

At any given moment, there is a certain percentage of the population that s up to no good. J. Edgar Hoover. Compliance & Ethics Institute

José Lopes da Mota Deputy Prosecutor General Former President of Eurojust

Analyzing a Potpourri of Fraud in Higher Education. Calvin Wendelboe, CPA, CIA, CFE

Lynn A. Neils PARTNER EDUCATION AND HONORS

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2016 SOUTHERN ASIA EDITION

Ethics Problems, Bias, Standards Violations & Overreaching in Litigation 2012 Forensic & Valuation Services Conference

716 West Ave Austin, TX USA

CSMFO CONFERENCE 2018

MEASURES TO COMBAT ECONOMIC CRIME

A PRESENTATION AT THE 4 TH ANNUAL INSITUTE OF CERTIFIED PUBLIC ACCOUNTANTS OF KENYA (ICPAK) FINANCIAL CONFERNCE HILTON HOTEL, NAIROBI

POLICY (OPERATIONAL) FRAUD CONTROL

16 17 AUGUST 2016 HOTEL AFRICANA, KAMPALA

SOMERVILLE HOUSING AUTHORITY ANTI- FRAUD POLICY. April 3, 2013

BRIBERY IN INTERNATIONAL BUSINESS TRANSACTIONS

ADVISORY. Forensic services. Assisting Legal Practitioners. kpmg.com/in

Reduce Your Risk: Understanding Internal Controls and Fraud Risks and Prevention

Forensic Accounting Fraud Investigations

Have you dealt with fraud in the past?

Town of Cohasset FRAUD RISK POLICY Adopted by Board of Selectmen:

KeyBank Special Report: Identifying And Mitigating Your Exposure To Fraud

Experienced, Talented, Trusted.

Introduction to Fraud Examination. Course #5695B/QAS5695B Exam Packet

Anne Eberhardt, CFE, CAMS Senior Director

Cyber-Insurance: Fraud, Waste or Abuse?

TOOLS FOR FRAUD DETERRENCE AND DETECTION DIAGNOSING HEALTH CARE FRAUD

Ampco-Pittsburgh Corporation

FRAUD A MULTIFACETED PHENOMENON TYPES OF FRAUD PREVENTION AND PROTECTION

A c f e. Report to. the Nation. on Occupational Fraud & Abuse

Fraud & Financial Services

Demystifying Forensic Accounting

Catch Me If You Can. Fraud in Local Government. CITY & COUNTY OF SAN FRANCISCO Office of the Controller Audits Division

MANAGING THE RISK OF FRAUD IN A GLOBAL ENVIRONMENT

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE GLObAL FrAUD STUDy

Heerema Marine Contractors

Whistle-Blowing Policy

C-SUITE S DIRTY LITTLE FRAUD SECRET

ANTI FRAUD, BRIBERY AND CORRUPTION POLICY

Jeffrey T. Harfenist, CPA *

Everything You Didn t Want To Know About Employee Crime

HUMAN CAPITAL FRAUD AND CORRUPTION PREVENTION

Demystifying Forensic Accounting

FINRA E-Learning Courses

Fraud Risk Assessment

Eric B. Bruce Lawyer WASHINGTON DC NEW YORK. Admissions

716 West Ave Austin, TX USA

Annie Chan Managing Director Forensic & Investigation Services FCPA, LLB, LLM, MBA,CFE

STRATEGIES FOR MANAGING RISKS FROM FRAUD TO CORRUPTION. April 11, 2017

APPENDIX 2 CORPORATE ANTI-FRAUD AND CORRUPTION STRATEGY

Recommendation of the Council for Further Combating Bribery of Foreign Public Officials in International Business Transactions

litigation and investigation services when the stakes are high, every decision is critical

The Risk of Economic Crime

Figure 1: Occupational Frauds by Category Frequency

Called Contact Senior Clerk - John Pyne Telephone Fax

Stop Fraud in Your Office. Presented by: Margaret A. (Peggy) McGarrity, Esq., CPA

November 2017 ICPAK FORENSIC AUDIT SEMINAR

provide expertise in matters involving arbitration support, including the making up of Statements, Reports, and Memorials on Account Books, on

TEXAS WORKFORCE COMMISSION LETTER. ID/No: Regulatory Integrity Date: August 17, 2009

Accounting Records: How They Are Used To Conceal Fraud

Presentation for: Counter Fraud Training Session. Friday 26 th April 2013

EXPERT GUIDE. January Private Investigators, Securities & Intelligence 2015

Transcription:

TABLE OF CONTENTS VOLUME I SECTION 1 FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ACCOUNTING CONCEPTS Accounting Basics... 1.101 Financial Statements... 1.105 Generally Accepted Accounting Principles (GAAP)... 1.115 FINANCIAL STATEMENT FRAUD What Is Financial Statement Fraud?... 1.203 The Cost of Financial Statement Fraud... 1.204 Why Financial Statement Fraud Is Committed... 1.204 Trends in Financial Statement Fraud... 1.206 Financial Statement Fraud Schemes... 1.206 What Red Flags Are Associated with Financial Statement Fraud in General?... 1.233 Detection of Fraudulent Financial Statement Schemes... 1.234 Financial Statement Analysis... 1.237 Interviews in Fraudulent Financial Statement Cases... 1.244 Prevention of Financial Statement Fraud... 1.253 ASSET MISAPPROPRIATION: CASH RECEIPTS Skimming... 1.301 Cash Larceny... 1.320 Theft of Cash on Hand... 1.333 ASSET MISAPPROPRIATION: FRAUDULENT DISBURSEMENTS Register Disbursement Schemes... 1.401 Check Tampering Schemes... 1.410 Electronic Payment Tampering... 1.433 Billing Schemes... 1.436 Payroll Fraud Schemes... 1.455 Expense Reimbursement Schemes... 1.473 i

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES ASSET MISAPPROPRIATION: INVENTORY AND OTHER ASSETS Misuse of Inventory and Other Assets... 1.501 Theft of Inventory and Other Assets... 1.502 Misappropriation of Intangible Assets... 1.518 BRIBERY AND CORRUPTION Corruption... 1.601 Detection of Bribery Schemes... 1.611 Conflicts of Interest... 1.627 Anti-Corruption Programs... 1.638 THEFT OF DATA AND INTELLECTUAL PROPERTY Competitive Intelligence Versus Espionage... 1.701 Where Intelligence Professionals Get Information... 1.704 Favorite Employee Targets of Intelligence Professionals... 1.712 How Information Is Lost or Stolen... 1.713 Electronic Countersurveillance... 1.735 Insider Threats to Proprietary Information... 1.736 Investigating Corporate Espionage... 1.741 Program for Safeguarding Proprietary Information... 1.743 Minimizing the Risks of Misappropriation Claims... 1.755 IDENTITY THEFT What Is Identity Theft?... 1.801 Perpetrators of Identity Theft... 1.801 Victims of Identity Theft... 1.802 Methods of Committing Identity Theft... 1.803 Types of Identity Theft Schemes... 1.804 How Identity Thieves Steal Information... 1.808 Methods of Preventing Identity Theft... 1.814 How to Respond to Identity Theft... 1.816 FINANCIAL INSTITUTION FRAUD Embezzlement Schemes... 1.901 Loan Fraud... 1.905 Real Estate Fraud... 1.916 New Account Fraud Schemes... 1.929 ii

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES FINANCIAL INSTITUTION FRAUD (CONT.) Money Transfer (Wire) Fraud Schemes... 1.932 Automated Teller Machine (ATM) Fraud... 1.936 Account Takeover... 1.937 Advance-Fee Fraud... 1.938 Letter-of-Credit Fraud... 1.939 Inside/Outside Frauds... 1.939 Prevention... 1.940 Suspicious Transaction Reports... 1.942 The Basel Committee on Banking Supervision... 1.943 PAYMENT FRAUD Check Fraud... 1.1001 Credit Card Fraud... 1.1011 Prevention and Detection of Credit Card Fraud... 1.1019 Electronic Bill Payment and Person-to-Person Payments... 1.1026 Online and Mobile Account Fraud... 1.1034 Alternative Currencies... 1.1036 INSURANCE FRAUD Types of Insurance Policies... 1.1101 Agent/Broker Fraud... 1.1102 Underwriting Irregularities... 1.1103 Vehicle Insurance Schemes... 1.1105 Property Schemes... 1.1108 Life Insurance Schemes... 1.1108 Liability Schemes... 1.1109 Red Flags of Insurance Fraud... 1.1109 Computer-Generated Detection Reports... 1.1113 Workers Compensation Fraud... 1.1114 HEALTH CARE FRAUD Introduction... 1.1201 Types of Health Care Systems... 1.1201 Provider Fraud... 1.1205 Fraud by the Medical Staff... 1.1211 Inflated Billings... 1.1212 Kickbacks in the Health Care Industry... 1.1216 iii

FINANCIAL TRANSACTIONS AND FRAUD SCHEMES HEALTH CARE FRAUD (CONT.) Fraud by Medical Institutions... 1.1218 Other Frauds in the Institutional Setting... 1.1224 Fraud in Special Care Facilities... 1.1225 Insured and Beneficiary Fraud... 1.1228 Fraud by Insurance Companies... 1.1230 Employee Claims Fraud... 1.1232 Electronic Claims Fraud... 1.1234 CONSUMER FRAUD Consumer Fraud Schemes... 1.1301 Elder Fraud... 1.1313 Telemarketing Fraud... 1.1316 Ponzi and Pyramid Schemes... 1.1334 COMPUTER AND INTERNET FRAUD Computer Fraud... 1.1402 Computer Hacking... 1.1403 Malware... 1.1417 Email... 1.1430 Internet Fraud... 1.1433 Electronic Commerce and Information Security... 1.1434 Insider Threats... 1.1437 Computer Security... 1.1439 CONTRACT AND PROCUREMENT FRAUD Basics of Contract Law... 1.1501 Methods of Procurement... 1.1503 Phases in the Procurement Process... 1.1507 Categories of Procurement Fraud Schemes... 1.1511 Preventing Contract and Procurement Fraud... 1.1534 iv

SECTION 2 LAW OVERVIEW OF THE LEGAL SYSTEM Basic Concepts of the Law... 2.101 Types of Legal Systems... 2.104 International Issues in Fraud Cases... 2.110 Court Systems... 2.112 Civil and Criminal Actions for Fraud... 2.113 THE LAW RELATED TO FRAUD Definition of Fraud... 2.201 Principal Types of Fraud... 2.201 International Initiatives Against Fraud and Corruption... 2.221 BANKRUPTCY (INSOLVENCY) FRAUD Introduction... 2.301 Key Parties in the Bankruptcy System... 2.301 Types of Bankruptcy Filings... 2.306 Bankruptcy Schemes... 2.307 Cross-Border Insolvency Regimes... 2.310 The World Bank Principles... 2.311 SECURITIES FRAUD Introduction... 2.401 What Constitutes a Security?... 2.401 Securities Laws and Regulations... 2.423 Securities Fraud Schemes... 2.439 Investigative Tips... 2.454 MONEY LAUNDERING Introduction... 2.501 The Money Laundering Process... 2.501 Money Laundering Methods... 2.504 International Anti-Money Laundering Efforts... 2.527 Enforcement and Prevention Strategies... 2.539 Special Problems for Insurance Companies... 2.542 v

LAW TAX FRAUD Introduction... 2.601 Evidence of Tax Fraud... 2.603 Types of Tax Evasion Schemes... 2.604 Common Defenses to Allegations of Tax Fraud... 2.606 INDIVIDUAL RIGHTS DURING EXAMINATIONS Employees Duties and Rights During Investigations... 2.701 Rights and Obligations Under Criminal Law... 2.707 The Law Relating to Government Search and Seizure... 2.713 Investigations in Private Actions... 2.716 THE CRIMINAL JUSTICE SYSTEM International Covenant on Civil and Political Rights... 2.801 The Charging Process... 2.803 Defenses... 2.805 The Trial Process... 2.807 Sentencing... 2.816 Appeal... 2.817 Punishment... 2.817 Corporate Criminal Liability... 2.817 THE CIVIL JUSTICE SYSTEM Introduction... 2.901 Procedure in Civil Cases... 2.901 Decisions and Remedies in Civil Cases... 2.909 Alternative Dispute Resolution... 2.912 BASIC PRINCIPLES OF EVIDENCE Definition of Evidence... 2.1001 Three Basic Forms of Evidence... 2.1002 Direct Versus Circumstantial Evidence... 2.1002 Admissibility of Evidence... 2.1003 Special Rules Concerning the Admission of Evidence in Adversarial Proceedings... 2.1006 Chain of Custody... 2.1025 Impeachment... 2.1027 Privileges and Protections... 2.1029 vi

LAW TESTIFYING Introduction... 2.1101 Considerations for Testifying as a Lay Witness... 2.1102 Considerations for Testifying as an Expert... 2.1105 Qualifying to Testify as an Expert Witness... 2.1111 Preparing to Testify... 2.1114 Direct Examination... 2.1117 Cross-Examination... 2.1122 Expressing an Opinion on Guilt... 2.1130 Summary... 2.1131 vii

VOLUME II SECTION 3 INVESTIGATION PLANNING AND CONDUCTING A FRAUD EXAMINATION Why Conduct a Fraud Examination?... 3.101 What Fraud Examination Entails... 3.102 Fraud Examination and Forensic Accounting... 3.103 Fraud Examination Methodology... 3.104 Develop a Fraud Response Plan... 3.111 Initial Response to Suspicions or Allegations of Fraud... 3.115 Planning and Conducting a Formal Investigation... 3.123 Structure the Investigation to Preserve Confidentiality... 3.143 ANALYZING DOCUMENTS Obtaining Documentary Evidence... 3.201 Examining Fraudulent Documents... 3.204 Handling Documents as Physical Evidence... 3.206 Identifying Writings... 3.209 The Document Expert s Findings... 3.212 How to Obtain Handwriting Samples... 3.213 Typewriters and Computer Printers... 3.215 Photocopies... 3.216 Dating a Document... 3.218 Indented Writings... 3.221 Counterfeit Printed Documents... 3.222 Fingerprints... 3.223 Sources for Expert Document Examinations... 3.225 INTERVIEW THEORY AND APPLICATION Preparation... 3.301 Characteristics of a Successful Interview... 3.301 Characteristics of an Effective Interviewer... 3.302 Legal Considerations When Conducting an Interview... 3.303 Elements of Conversations... 3.304 Inhibitors of Communication... 3.306 Facilitators of Communication... 3.309 Kinesic Interview and Interrogation... 3.311 The Cognitive Interview Technique... 3.315 viii

INVESTIGATION INTERVIEW THEORY AND APPLICATION (CONT.) PEACE Interviewing Method... 3.318 Interview Mechanics... 3.320 Question Typology... 3.322 Introductory Questions... 3.324 Informational Questions... 3.332 Closing Questions... 3.345 Assessment Questions... 3.347 INTERVIEWING SUSPECTS AND SIGNED STATEMENTS Admission-Seeking Questions... 3.401 Signed Statements... 3.425 Criteria-Based Statement Analysis... 3.428 COVERT EXAMINATIONS Establishing an Identity... 3.502 Objectives... 3.503 Problems in Covert Operations... 3.504 Surveillance... 3.507 Sources and Informants... 3.516 Use of Operatives... 3.525 SOURCES OF INFORMATION Public Versus Nonpublic Records... 3.602 Local Records... 3.605 Court Records... 3.607 Property Records... 3.612 Business (Corporate) Filings... 3.614 Other Agency Records... 3.616 Nonpublic Records... 3.620 Other Non-Government Sources... 3.627 Accessing Information Online... 3.630 Additional Information Sources... 3.661 DATA ANALYSIS AND REPORTING TOOLS Understanding the Need for Data Analysis... 3.701 Data Mining... 3.703 ix

INVESTIGATION DATA ANALYSIS AND REPORTING TOOLS (CONT.) The Data Analysis Process... 3.705 Spectrum of Analysis... 3.713 Using Data Analysis Software... 3.713 Textual Analytics... 3.736 Visual Analytics... 3.739 Evaluating Data Analysis Software... 3.743 Types of Data Mining and Analysis Software... 3.745 Reporting and Case Management Software... 3.746 DIGITAL FORENSICS Conducting an Investigation Involving Computers... 3.801 Computer Investigations and Computer Forensics... 3.814 Investigating in the Cloud... 3.829 Mobile Forensic Investigations... 3.834 Digital Forensics Software... 3.840 TRACING ILLICIT TRANSACTIONS General Process for Tracing Illicit Transactions... 3.901 Direct Methods of Tracing Financial Transactions... 3.910 Indirect Methods of Tracing Financial Transactions... 3.940 Locating Hidden Assets... 3.958 REPORT WRITING The Importance of Writing Effective Reports... 3.1001 Preparation... 3.1002 Characteristics of a Good Report... 3.1003 Common Reporting Mistakes... 3.1006 Organization of Information... 3.1010 Analyzing the Reader... 3.1010 Outlining... 3.1012 Grammatical Considerations... 3.1013 Report Structure... 3.1018 Reporting Documents... 3.1025 Visual Aids... 3.1029 Presenting the Case to Prosecutors and Other Government Authorities... 3.1034 x

INVESTIGATION APPENDIX A: ENGAGEMENT AND ADVISORY LETTERS Fraud Examination Engagement Letters... 3.1101 Fraud Examination Advisory Letters... 3.1103 APPENDIX B: FRAUD EXAMINATION CHECKLIST Fraud Examination Checklist... 3.1201 APPENDIX C: SAMPLE FORMS Consent to Search... 3.1301 Customer Consent and Authorization for Access to Financial Records... 3.1303 Fraud Incident Report Log... 3.1304 Inventory of Evidence and Chain of Custody Log... 3.1306 Evidence Control Log... 3.1307 APPENDIX D: ADDITIONAL INFORMATION SOURCES Directories... 3.1401 Banks and Financial Institutions... 3.1407 International Law Enforcement Organizations... 3.1409 APPENDIX E: SAMPLE FRAUD EXAMINATION REPORTS Short-Form Report... 3.1502 Long-Form Report... 3.1509 xi

SECTION 4 FRAUD PREVENTION AND DETERRENCE UNDERSTANDING CRIMINAL BEHAVIOR Behavioral Analysis and the Prevention of Fraud... 4.101 Why People Obey the Law... 4.108 Theories of Crime Causation... 4.117 WHITE-COLLAR CRIME What Is White-Collar Crime?... 4.201 Crimes of the Middle Classes A Look at White-Collar Crime... 4.203 Organizational Crime... 4.212 Occupational Fraud... 4.226 Research in Occupational Fraud and Abuse... 4.227 CORPORATE GOVERNANCE What Is Corporate Governance?... 4.301 Who Is Involved in Corporate Governance?... 4.301 The Role of Corporate Governance in Fighting Fraud... 4.306 Principles of Corporate Governance... 4.307 Establishing a Corporate Governance Framework... 4.321 Corporate Governance Codes and Guidance... 4.322 MANAGEMENT S FRAUD-RELATED RESPONSIBILITIES The Legal Foundation for Management s Fraud-Related Responsibilities... 4.401 Management s Responsibility for Internal Controls... 4.402 Management s Responsibility for an Effective Corporate Compliance and Ethics Program... 4.406 Document Retention Policies... 4.416 AUDITORS FRAUD-RELATED RESPONSIBILITIES External Audit Standards Related to Fraud... 4.501 Internal Auditors Fraud-Related Responsibilities... 4.525 International Standards for Government Auditing... 4.533 FRAUD PREVENTION PROGRAMS Selling Fraud Prevention to Management... 4.601 Procedures to Prevent Fraud... 4.602 Anti-Fraud Policy... 4.615 xii

FRAUD PREVENTION AND DETERRENCE FRAUD PREVENTION PROGRAMS (CONT.) Ethics Programs... 4.620 Sample Anti-Fraud Policy... 4.623 Fraud Policy Decision Matrix... 4.627 Sample Code of Business Ethics and Conduct... 4.628 FRAUD RISK ASSESSMENT What Is Fraud Risk?... 4.701 What Factors Influence Fraud Risk?... 4.701 What Is a Fraud Risk Assessment?... 4.703 Preparing the Company for a Fraud Risk Assessment... 4.710 Fraud Risk Assessment Frameworks... 4.714 Addressing the Identified Fraud Risks... 4.724 Responding to Residual Fraud Risks... 4.726 Reporting the Results of the Fraud Risk Assessment... 4.728 Making an Impact with the Fraud Risk Assessment... 4.730 The Fraud Risk Assessment and the Audit Process... 4.732 The Fraud Risk Assessment Tool... 4.733 FRAUD RISK MANAGEMENT Foundational Guidance for Fraud Risk Management... 4.801 What Is Risk Management?... 4.801 Risk Management Frameworks... 4.803 Integrating Anti-Fraud Initiatives into Risk Management... 4.808 Who Is Responsible for Managing Fraud Risk?... 4.811 The Objectives of a Fraud Risk Management Program... 4.816 Fraud Risk Management Principles... 4.817 Steps in Developing a Fraud Risk Management Program... 4.821 Fraud Risk Management Program Components... 4.825 The Use of Data Analytics in Managing Fraud Risk... 4.829 ETHICS FOR FRAUD EXAMINERS What Is Ethics?... 4.901 Morality, Ethics, and Legality... 4.903 Some Concluding Remarks... 4.907 xiii

FRAUD PREVENTION AND DETERRENCE ACFE CODE OF PROFESSIONAL ETHICS Commitment to Professionalism and Diligence... 4.1002 Legal and Ethical Conduct and Conflict of Interest... 4.1005 Integrity and Competence... 4.1009 Court Orders and Testimony... 4.1012 Reasonable Evidential Basis for Opinions... 4.1014 Confidential Information... 4.1017 Complete Reporting of Material Matters... 4.1022 Professional Improvement... 4.1023 CFE CODE OF PROFESSIONAL STANDARDS CFE Code of Professional Standards... 4.1101 xiv