Blog



CMS.DataEngine.CollectionPropertyWrapper`1[CMS.DataEngine.BaseInfo]
Profile Image Verifile
December 6, 2024
Blog Article Image

The Different Types of Insider Fraud

This is the second instalment in our 10-part series on unmasking insider fraud and implementing effective risk mitigation strategies.


In our previous post, we introduced the concept of insider fraud and its significant impact on organisations. Today, we'll delve deeper into the various types of insider fraud, providing real-life cases to illustrate each and discussing how they can be detected. Understanding these different forms is crucial for HR professionals and compliance officers aiming to safeguard their organisations.
 

Embezzlement.png

Embezzlement involves the misappropriation of funds or assets entrusted to an employee. Typically occurring over an extended period, it often involves individuals in positions of trust with access to financial accounts.

Real-Life Case: Lesley Stewart

Lesley Stewart, an office manager at a carpentry company, exploited her position to steal £300,000. Over several years, she manipulated financial records and changed HM Revenue & Customs (HMRC) address details to divert funds into her own accounts. Her fraudulent activities were uncovered only after an internal audit revealed financial discrepancies.

Detection Strategies:

  • Regular Audits: Implement periodic internal and external financial audits to identify inconsistencies.
  • Separation of Duties: Ensure that financial responsibilities are divided among multiple employees to reduce the risk of unilateral control.
  • Background Checks: Conduct thorough background screening, including credit checks and employment history verification.
 

Payroll-Fraud.png

Payroll fraud occurs when an employee manipulates the payroll system to receive unauthorised compensation. This can include creating fictitious employees or inflating work hours.

Potential Scenario

An employee in the finance department creates ghost employees in the payroll system, funnelling the salaries into their own bank accounts. Without proper checks, this fraud can continue undetected for months or even years.

Detection Strategies:

  • Payroll Reconciliation: Regularly compare payroll records with actual employee data.
  • Access Controls: Limit access to payroll systems and employ multi-factor authentication.
  • Surprise Audits: Conduct unannounced audits to catch irregularities.
  Procurement-Fraud-and-Bribes.png

Procurement fraud involves unethical practices in the purchasing process, such as bribery, kickbacks, or awarding contracts in exchange for personal gain.

Real-Life Case: Lorna Porter

Lorna Porter worked at a law firm where she defrauded estates of deceased clients. Over six years, she created false invoices and diverted £634,000 into her own accounts. She exploited her trusted position, and her actions were only discovered during an audit prompted by suspicions.

Detection Strategies:

  • Vendor Verification: Conduct due diligence on all vendors and suppliers.
  • Transaction Monitoring: Implement systems to flag unusual or large transactions.
  • Whistleblower Policies: Encourage employees to report suspicious activities anonymously.
 

Invoice-and-Expense-Fraud.png

This type of fraud involves employees submitting false or inflated invoices and expense claims to gain unauthorised benefits.

Real-Life Case: Brandon Leung

Brandon Leung, a barista, inserted his own chip and PIN device to siphon customer payments into his account. Despite having previous convictions for theft, he secured employment due to inadequate background checks. Over time, he diverted £4,000 before being caught.

Detection Strategies:

  • Expense Policy Enforcement: Establish clear guidelines for expense claims and enforce them strictly.​
  • Receipt Verification: Require original receipts and verify their authenticity.
  • Background Screening: Implement comprehensive pre-employment checks to identify past misconduct.
  Theft-of-Business-Assets.png

Theft of physical assets includes stealing equipment, inventory, or office supplies. While sometimes considered minor, these losses can accumulate significantly over time.

Detection Strategies:

  • Inventory Management: Maintain accurate records of all assets and perform regular stock checks.
  • Surveillance Systems: Use CCTV cameras in key areas to deter and detect theft.
  • Access Controls: Restrict access to storage areas and valuable equipment.
  Information-Theft.png

Information theft involves stealing sensitive company data, such as customer information, trade secrets, or confidential records, often to sell or use for personal advantage.

Real-Life Case: Peter Omoruyi

Peter Omoruyi, a convicted sex trafficker, managed to work with vulnerable teenagers in the UK due to gaps in background screening processes. His access to sensitive information and individuals posed severe risks, highlighting the dangers of inadequate vetting.

Detection Strategies:

  • Comprehensive Screening: Include international criminal record checks and verify all past employment.
  • Data Access Controls: Limit access to sensitive information based on role necessity.
  • Monitoring Systems: Implement software to detect unusual data access or transfers.
  Intellectual-Property-Theft.png

This occurs when employees steal proprietary information, such as software code, product designs, or business strategies, to benefit themselves or competitors.

Detection Strategies:

  • Confidentiality Agreements: Require employees to sign non-disclosure agreements.
  • Exit Procedures: Conduct thorough offboarding processes to ensure return of all company property.
  • Digital Rights Management: Use technology to protect and track access to digital assets.

Conflict-of-Interests.png

Conflicts of interest arise when employees make decisions that benefit themselves, friends, or family members, often at the expense of the organisation.

Real-Life Case: Carl Stokes

Carl Stokes, a fire safety assessor involved in the Grenfell Tower tragedy, misrepresented his qualifications. His lack of expertise contributed to inadequate safety assessments, underscoring the dangers of undisclosed conflicts and falsified credentials.

Detection Strategies:

  • Declaration Policies: Require employees to declare any potential conflicts of interest.
  • Qualification Verification: Verify all professional qualifications and certifications.
  • Continuous Monitoring: Regularly update employee information and re-screen as necessary.
  Cyber-Fraud.png

Employees may engage in cyber fraud by introducing malware, hacking into systems, or facilitating cyberattacks, leading to data breaches and financial losses.

Detection Strategies:

  • Cybersecurity Training: Educate employees about cybersecurity best practices.
  • Network Monitoring: Use intrusion detection systems to monitor network activity.
  • Access Restrictions: Implement the principle of least privilege for system access.
 

Why Understanding These Types Matters

By recognising the various forms of insider fraud, organisations can tailor their prevention and detection strategies effectively. Each type presents unique risks and requires specific controls.

Conclusion

Insider fraud manifests in numerous ways, from financial manipulation to intellectual property theft. Real-life cases like those of Lesley Stewart, Lorna Porter, and others highlight the tangible risks that organisations face. HR professionals and compliance officers must remain vigilant, employing robust screening processes and ongoing monitoring to detect and prevent such activities.

In our next post, we'll explore the importance of implementing risk mitigation strategies and how they can protect your organisation from insider threats.


Stay tuned for Part 3: "The Importance of Implementing Risk Mitigation Strategies" coming soon.

Read More
CMS.DataEngine.CollectionPropertyWrapper`1[CMS.DataEngine.BaseInfo]
Profile Image Verifile
December 5, 2024
Blog Article Image

India's Legal Education Overhaul: Ensuring Ethics and Integrity

The Bar Council of India (BCI) has introduced sweeping reforms to address growing concerns about ethical lapses in the legal profession. Recent high-profile cases of fraud and misconduct by practising lawyers have brought the integrity of the profession into question. These new regulations aim to reinforce accountability and professionalism at the foundational stage of legal education.

Among the key changes are mandatory criminal background checks, declarations regarding simultaneous academic and employment engagements, biometric attendance systems, and CCTV surveillance in all Centres of Legal Education (CLEs). These measures are designed not only to deter misconduct but also to restore public trust in the justice system.
 

Planned Changes

The BCI circular mandates the following reforms:

  1. Mandatory Criminal Background Checks
    • Law students must declare any pending or past criminal cases, FIRs, convictions, or acquittals.
    • Institutions must report these cases to the BCI and await its decision before issuing final degrees or marksheets.
  2. Declarations on Simultaneous Degrees and Employment
    • Students must confirm they are not enrolled in another full-time academic programme or employed during their LL.B. studies, unless explicitly permitted under BCI rules.
    • Violators risk having their degrees withheld and legal consequences.
  3. Biometric Attendance and CCTV Surveillance
    • CLEs must install biometric systems to ensure accurate attendance monitoring.
    • CCTV cameras are required in classrooms and key areas, with recordings preserved for at least one year for potential investigations.
  4. Institutional Accountability
    1. CLEs that fail to implement these measures face severe penalties, including de-recognition and loss of affiliation.
 

Reasons Behind the Reforms

  1. Addressing Scandals in the Profession
    • Cases such as the ₹200 crore fake arbitration scam, where Advocate Amit Chaurasiya forged documents and impersonated legal representation, highlight the need for tighter controls.
    • Similarly, the seven-year suspension of Advocate Peeush Kulshreshtha for forging court orders underscores systemic vulnerabilities that must be addressed.
  2. Restoring Public Confidence
    • Public trust in the justice system has been eroded by repeated instances of lawyer misconduct. The BCI reforms aim to rebuild this confidence by holding students to higher ethical standards.
  3. Prevention of Misconduct at the Entry Level
    • By enforcing these checks during legal education, the BCI hopes to prevent individuals with unethical intentions from entering the profession.
 

Consequences of Non-Compliance

  1. For Students
    • Non-disclosure of criminal records, simultaneous degrees, or employment details will result in academic and legal penalties, including withholding marksheets and degrees.
  2. For Institutions
    • CLEs that fail to comply with the mandates risk losing their affiliation and recognition by the BCI.

Benefits of the New Measures

  1. Enhanced Accountability and Professionalism
    • Criminal background checks and biometric attendance ensure transparency and deter unethical behaviour.
  2. Public Confidence in Legal Professionals
    • These reforms are designed to ensure that future lawyers are held to the highest moral and professional standards, restoring faith in the judiciary.
  3. Deterrence of Fraudulent Practices
    • High-profile cases of misconduct have made it clear that stricter regulations are essential to uphold the integrity of the profession.
  4. Alignment with Global Standards
    • By adopting measures such as background checks and biometric monitoring, the BCI aligns Indian legal education with international best practices.
 

Challenges and Considerations

  1. Implementation Hurdles
    • Smaller law schools may struggle to afford the infrastructure required for biometric attendance systems and CCTV cameras.
  2. Privacy and Ethical Concerns
    • Biometric attendance and surveillance raise legitimate questions about data protection and potential misuse.
  3. Risk of Overreach
    • Strict background checks and reporting requirements could discourage individuals with minor past infractions from pursuing legal education, potentially limiting access to the profession.
  4. Consistency in Enforcement
    • Uniform implementation across thousands of CLEs will require significant resources and oversight from the BCI.
 

Broader Implications

The reforms extend beyond ensuring individual compliance. They represent a fundamental shift in how legal education and professionalism are perceived in India. By prioritising ethics at the entry level, the BCI sets a precedent for other professions grappling with similar challenges.

Internationally, legal systems in countries like the UK and the US already enforce strict background checks and professional conduct guidelines. By introducing similar standards, the BCI is positioning Indian legal professionals to meet global expectations.
 

Conclusion

The BCI’s reforms represent a decisive step towards revitalising the legal profession in India. While the challenges of implementation are significant, the potential benefits—improved accountability, deterrence of misconduct, and restored public trust—make this initiative a necessary and welcome development.

However, for these changes to succeed, the BCI must ensure that institutions and students alike are supported through this transition. With consistent enforcement and careful consideration of ethical concerns, these reforms could set a new standard for legal education and professional conduct in India.
 

Key Sources and References

  1. Bar Council of India Official Circular
    Source of the official mandates, criminal background checks, and related rules.
    Bar Council of India
  2. India Today:
    Report detailing the BCI’s new measures and their broader implications.
    BCI mandates criminal background checks and declarations for law students - India Today
  3. Mid-Day:
    Coverage of the ₹200 crore fake arbitration scam involving Advocate Amit
    Chaurasiya, highlighting the need for stricter regulations.
    Mumbai Police arrest lawyer in Rs 200 cr fake arbitration scam
  4. The Hindu:
    Details on the suspension of Advocate Peeush Kulshreshtha for defrauding a client and forging court orders.
    Delhi lawyer suspended for 7 years for defrauding client, forging court order - The Hindu
  5. Times of India:
    Insights into biometric attendance and criminal checks for law students.
    Bar Council of India mandates criminal background checks, biometric attendance, installing of CCTVs in all law institutes: Official notice here - Times of India

Read More
CMS.DataEngine.CollectionPropertyWrapper`1[CMS.DataEngine.BaseInfo]
Profile Image Verifile
December 3, 2024
Blog Article Image

The New York Clean Slate Act: A Comprehensive Overview for Employers

On 16 November 2024, the New York Clean Slate Act will take effect, introducing significant changes to how criminal records are handled. This legislation aims to help individuals with past convictions reintegrate into society by sealing certain records after a specified period.

Key Provisions of the Clean Slate Act

  • Automatic Sealing of Convictions:
    • Misdemeanours will be sealed three years after sentencing, provided no further criminal activity occurs.
    • Felonies will be sealed eight years after sentencing, excluding time incarcerated, if there are no new offences.
    • Eligibility requires completion of sentences, including probation or parole, with no pending charges or new convictions during the waiting period.
  • Exceptions:
    • Records for certain offences, including sex crimes and most Class A felonies (e.g., murder), are not eligible for sealing.
  • Implementation Timeline:
    • The New York State Unified Court System has until 16 November 2027 to systematically seal eligible records.

Implications for Employers

  • Access to Sealed Records:
    • Once sealed, records will no longer be available to most employers during background checks. Exceptions include law enforcement agencies and organisations involved in firearm licensing.
  • Notification Requirements:
    • Employers must provide individuals with a copy of any background check report containing criminal history, regardless of intent to take adverse action.
    • A copy of Article 23-A of the New York Correction Law must also be provided, outlining individuals’ rights and the process for disputing inaccuracies.

Rationale Behind the Legislation

The Clean Slate Act seeks to address the barriers individuals with criminal records face in
securing employment, housing, and education. By sealing eligible records, the Act aims to:

  • Reduce recidivism.
  • Enhance public safety.
  • Expand workforce participation and stimulate economic growth.

Advocates believe this approach fosters a fairer society and supports rehabilitated
individuals in making positive contributions to their communities.
 

Practical Considerations for Employers

  • Review Hiring Practices:
    • Update hiring practices to comply with the Act, including distributing reports
      and related documentation.
    • Ensure legal compliance to avoid potential penalties.
  • Training and Compliance:
    • Train HR teams to understand the new requirements and implement
      processes effectively.

Conclusion

The New York Clean Slate Act represents a landmark shift in criminal justice reform, offering second chances to rehabilitated individuals while maintaining public safety. Employers and individuals must embrace the Act’s provisions to foster a more inclusive society.

References

  1. Clean Slate NY FAQ: https://www.cleanslateny.org/faq
  2. NY Assembly Clean Slate Act Summary: https://nyassembly.gov/cleanslate/?sec=home
  3. Article 23-A, New York Correction Law: https://www.nycourts.gov/courts/6jd/forms/SRForms/Correction_Law_Art23-A.pdf

Read More