© 2011 All Rights Reserved. Page 1
January 18, 2011
© 2011 All Rights Reserved. Page 2
DiscoveryAnonymous reporting
Ongoing communications
Document attachments
Control access
Secure database
© 2011 All Rights Reserved. Page 3
VerificationTrue nature and scope
Who was involved; why
Collect information
Least disruptive to organization
Best possible ROI
© 2011 All Rights Reserved. Page 4
AnalysisResearch
Due diligence
IT forensics
Threat / risk assessment
Security assessment
© 2011 All Rights Reserved. Page 5
ResolutionCorrective action
Disciplinary action
Separation agreements
Policy review
© 2011 All Rights Reserved. Page 6
EducationProcess of Investigation
Investigative Interviewing
Fraud Detection / Prevention
I-9 Verification
Workplace Violence Prevention
© 2011 All Rights Reserved. Page 7
PreventionPolicy review
Process improvement
Harness the power of hotlines
© 2011 All Rights Reserved. Page 8
Anonymous Reporting
40.2% fraud detected by tips
25% exceed $1M in losses
Regulatory compliance
Litigation avoidance
Risk insurance
© 2011 All Rights Reserved. Page 9
DifferentiatorsInsight in an Instant™
Custom distribution/notification
Ongoing communications
Full audit tracking
Professional consultation
© 2011 All Rights Reserved. Page 10
OptionsCustomize message
Case management
Statistical analytics
Rebranding
© 2011 All Rights Reserved. Page 11
Core Application
24/7/365 web and phone
Multilingual support
Secure database
Data archival
SaaS model
© 2011 All Rights Reserved. Page 12
NAICS561611 Investigation Services
611430 Professional DevelopmentTraining
541990 Other Professional, Scientificand Technical Services
541612 Human Resources ConsultingServices
641199 All Other Legal Services
© 2011 All Rights Reserved. Page 13
CompliantDodd-Frank
Federal Sentencing Guidelines
Jeanne Clery Act
US Rehab Act, Section 508
Safe Harbor Certified
© 2011 All Rights Reserved. Page 14
CompliantSOXFARFCRAFERPADoDReauthorizationERA Amendments
AIR 21ARRACPSIAFRSAFSMANTSSAPPACASTAA
Top Related