ACC/556
November 5, 2013
Procedures in Collecting Forensic Evidence
1.) What procedures will you use to collect accounting evidence?
The stages of the procedures are as following: 1.) Initiation- This is broken into two different categories of reactive and pro active. The reactive side of the categories is the action of a victimization that has already happened. The tips to these crimes are investigated because of an external report of the crime being committed. These can be reported by anyone that is an external source such as auditors, stockholders’, ex-employees, and etc… The external reporters can say something if the employee leaves the company or when the employee is still working there. Each one of the situations will need to be handled in very different ways.
The proactive form of this category is when the crime happens due to an investigation and found accidentally in this investigation. For example, the auditor is auditing the financials of the company and stumble upon a money laundering incident accidentally in this investigation. The investigations that are completed can be done in numerous ways such as undercover work, surveillance, keystroke logging, passwords, and computer tracking proof.
When the company is initiated by the report of the crime they will have to sort through the information and find out what part of the crime reported is fact and fiction. The company’s investigator will have to comb through all the information and find out all the facts that can be proved through financial combing and computer record searching. If the company does not make sure they have proof of the back up their claim then they can lose creditability and in turn be suede by the person accused. Each crime is determined by the numerous laws that are set by state and federal levels. The company will need to look at the evidence and weigh solvability factors with what is the strongest of the evidence.