Practice and Procedure Flashcards
If the evidence clearly shows that a suspect has committed a crime, it is permissible for a fraud examiner to testify that, in their opinion, the suspect is guilty because the evidence has established all the essential elements of the offense charged.
A. True
B. False
B. False
See pages 2.1122 in the Fraud Examiner’s Manual
Certain standards for fraud examiners are found in the ACFE Code of Professional Ethics. Specifically, fraud examiners are prohibited from expressing opinions as to the guilt or innocence of any person or party. This is not to say that the witness cannot testify to the badges, hallmarks, or characteristics of fraud found in the case. It also does not mean that the fraud examiner cannot testify that, based on the evidence, they believe that the accused might have committed the offense. But the ultimate guilt or innocence of any person or party is the sole responsibility of the fact finder. Typically, the fraud examiner will not be permitted to testify to the ultimate fact questions.
In an adversarial system, the testimony of an expert witness will be admitted if the testimony is informative, at least to some extent, to any issue.
A. True
B. False
B. False
See pages 2.1113-2.1114 in the Fraud Examiner’s Manual
A trial judge will not admit an expert witness’s testimony unless the judge determines that the expert is a qualified practitioner and that the testimony being offered by the expert is relevant to the facts of the case and reliable. The qualification element addresses whether the individual is qualified to assist the trier of fact. Relevant testimony will assist the jury in understanding the evidence or determining a fact at issue. To be relevant, the proposed testimony must be sufficiently related to the facts of the case so that it will aid the jury in resolving a factual dispute. To be reliable, the testimony must be based on sufficient facts and data, and it must be the product of reliable methodology that has been reliably applied to the facts of the case.
Blue is a defendant on trial for fraud in a common law jurisdiction. One of the key pieces of evidence in the trial is a handwritten letter written by Blue that indicates his intent to commit the fraud. Before the letter can be admitted into evidence, Blue’s authorship of the letter must be established. Which of the following statements about establishing the authenticity of the letter is CORRECT?
A. The letter’s authenticity can be established by having a witness testify that they saw Blue write the letter
B. The letter’s authenticity can be established by having the jury review the document and vote on its authenticity
C. Because the letter is self-authenticating, it does not need additional authentication to be admitted
D. None of the above
A. The letter’s authenticity can be established by having a witness testify that they saw Blue write the letter
See pages 2.1006, 2.1008 in the Fraud Examiner’s Manual
In common law systems using adversarial processes, exhibits—the tangible objects presented as evidence—are inadmissible unless they are relevant and established as authentic. Thus, to be admissible at trial, evidence, other than testimonial evidence, must be properly authenticated; that is, the party offering the item must produce some evidence (e.g., testimony from a person who has firsthand knowledge) to show it is, in fact, what the party says it is and that it is in the same condition as when it was seized. If an exhibit cannot be authenticated, it will not be admitted even if it is plainly relevant.
In general, authentication of a writing consists of establishing who authored the document. Depending on the document and situation, this is done in one of several ways: (1) the author testifies and claims authorship; (2) a witness testifies to seeing the author write the document; (3) with handwritten letters, a witness verifies the author’s penmanship; (4) with typed or machine-written documents, the witness verifies the author’s signature; or (5) a witness testifies that the contents of the document point decisively to the author. These and many other document issues might require the participation of a document expert.
Which of the following parties decides the scope of the examinations and breadth of authority of a court-appointed expert witness in an inquisitorial court?
A. The parties to the litigation
B. A panel of the expert’s professional peers
C. The expert witness
D. The judge
D. The judge
See pages 2.1119 in the Fraud Examiner’s Manual
Inquisitorial courts typically appoint their own experts to evaluate technical matters. Expert witnesses in inquisitorial jurisdictions are subject to various examinations by the judge and the parties and might have to conduct their own examinations of witnesses. Usually, all the expert’s activities related to the case are controlled by the judge, who determines the scope of the expert’s testimony and analysis, the expert’s authority to access certain items of evidence, whom the expert can interview, and several other functions. Because some jurisdictions allow parties to submit testimony or evidence from their own experts in addition to the court-appointed expert, the latter might need to interview the parties’ experts. The expert should carefully follow the judge’s instructions, especially because the instructions are usually made available to the parties of the proceeding.
Blake, a Certified Fraud Examiner (CFE), is testifying in court as a witness in an adversarial jurisdiction. During cross-examination, opposing counsel keeps getting extremely close to Blake, invading his body space. What should Blake do?
A. Get through the questioning without complaining or arguing.
B. Ask the judge to intervene.
C. Move toward opposing counsel, decreasing body space.
D. Attempt to move away from opposing counsel.
A. Get through the questioning without complaining or arguing.
See pages 2.1125 in the Fraud Examiner’s Manual
Opposing counsel might attempt to take psychological control of a witness by:
- Using physical presence to intimidate
- Making nonstop eye contact
- Challenging the witness’s space
- Asking questions at a fast pace to confuse the witness
- Not allowing the witness to explain or deviate from the exact question
It is not the witness’s job to argue with or challenge the person conducting questioning. The witness should simply try to get through the cross-examination in the most professional way possible. If the questioning party uses blatantly unfair practices, the judge or jury will take note, and such practices might hurt the opposing side’s case. In no circumstances should the witness argue. In adversarial proceedings, the counsel who called the witness is tasked with objecting to improper questioning, so the witness should continue answering questions until an objection is made and then follow the court’s directions. In inquisitorial proceedings, the judge should intervene if questioning is improper.
In most inquisitorial jurisdictions, the judge has the sole discretion to raise objections regarding an expert witness’s biases.
A. True
B. False
B. False
See pages 2.1119, 2.1126 in the Fraud Examiner’s Manual
In inquisitorial jurisdictions, parties are usually allowed to raise limited objections to an expert witness if they believe the expert is biased. For example, the expert might have a relationship with one of the parties to the litigation. The parties are often allowed to question the expert’s analysis or methods used. While this process is less confrontational than in adversarial systems, a poor performance can lead to the court rejecting the expert’s testimony. The judge may also question the expert’s credibility and qualifications and ultimately decides how much consideration should be given to the expert’s testimony.
Evidence that proves or disproves facts by inference is called direct evidence.
A. True
B. False
B. False
See pages 2.1002 in the Fraud Examiner’s Manual
There are two basic categories of admissible evidence: direct evidence and circumstantial evidence. Direct evidence is evidence that tends to prove or disprove a fact in issue directly, such as eyewitness testimony or a confession. Circumstantial evidence is evidence that tends to prove or disprove facts in issue indirectly, by inference.
Black, a Certified Fraud Examiner (CFE) who lives and works in a common law legal system with a litigation privilege, discovers a potential fraud at the ABC Company while auditing ABC’s procedures. She immediately notifies ABC’s in-house counsel. As a result, Black’s work up until that point is protected by:
A. The CFE-client privilege
B. The investigator-client privilege
C. The employer-employee privilege
D. None of the above
D. None of the above
See pages 2.1032 in the Fraud Examiner’s Manual
Although the work undertaken by a fraud examiner may be protected by a litigation privilege, to receive protection, the work must be done in anticipation of litigation and at the attorney’s direction. Here, even if Black’s work was done at the attorney’s direction, her work was not prepared in anticipation of litigation because no litigation was planned. Therefore, the litigation privilege does not cover the documents because they came into existence before litigation was contemplated.
The ACFE Code of Professional Ethics prohibits fraud examiners from expressing opinions regarding the guilt or innocence of any person or party. This means that a fraud examiner who serves as an expert witness may NOT answer questions about whether the defendant committed actions that are characteristic of fraud.
A. True
B. False
B. False
See pages 2.1122 in the Fraud Examiner’s Manual
Certain standards for fraud examiners are found in the ACFE Code of Professional Ethics. Specifically, fraud examiners are prohibited from expressing opinions as to the guilt or innocence of any person or party. This is not to say that the witness cannot testify to the badges, hallmarks, or characteristics of fraud found in the case. It also does not mean that the fraud examiner cannot testify that, based on the evidence, they believe that the accused might have committed the offense. But the ultimate guilt or innocence of any person or party is the sole responsibility of the fact finder. Typically, the fraud examiner will not be permitted to testify to the ultimate fact questions.
In the context of an employee interview, all the following actions could result in liability for false imprisonment EXCEPT:
A. Standing in front of an exit to an interview room
B. Telling the interviewee that they may not leave the room
C. Telling the interviewee that they are required to answer questions
D. Locking the door to an interview room
C. Telling the interviewee that they are required to answer questions
See pages 2.730-2.731 in the Fraud Examiner’s Manual
False imprisonment is the unlawful restraint by one person of the physical liberty of another without consent or legal justification. A claim of false imprisonment might arise if an employee is detained in any way during a search or interview. Generally, an employer is entitled to question an employee at work about a violation of company policy without incurring liability if the employee submits to the questioning voluntarily—that is, not as a result of threats or force.
There are no precise rules as to when a false imprisonment occurs, but factors such as the length, nature, and manner of the interview might determine whether liability arises. Other factors used to determine if an individual has been falsely imprisoned include:
- Conducting an interview in a room that is small and confined in nature (e.g., small, windowless, not easily accessible)
- Conducting an interview in a room with severe lighting
- Requiring the employee’s presence or continued presence by any amount of physical force (e.g., holding the employee’s arm to escort them or pushing the employee into a chair)
- Using violent behavior of any kind during the interview, including yelling, pounding on desks, or kicking furniture or walls
- Using a physical barrier to restrain the employee (e.g., locking the interview room’s door or standing in front of an interview room’s exit)
- Making threats of immediate physical force to restrain the employee
- Conducting an interview in the presence of numerous people
White, a Certified Fraud Examiner (CFE), believes that Blue, a fraud suspect, is guilty of embezzlement. White shares this theory with a supervisor. Blue later turns out to be innocent. Blue can sue and probably recover from White on a theory of defamation.
A. True
B. False
B. False
See pages 2.718-2.719 in the Fraud Examiner’s Manual
Generally, defamation refers to the unprivileged publication of false statements about a person that causes harm to that person’s reputation. To recover for defamation, the plaintiff must generally prove all the following elements:
- The defendant made an untrue statement of fact.
- The statement was communicated (published) to third parties.
- The statement was made on an unprivileged occasion.
- The statement damaged the subject’s reputation.
For a statement to qualify as defamatory, the occasion in which the statement is made must be an unprivileged one. If the statement is made on a privileged occasion, then no liability can attach to the speaker. Basically, the law recognizes that there are some circumstances in which the need to share information is so important that people will be allowed to make mistakes occasionally without having to worry about being sued for defamation. Statements that are made in these circumstances are said to be privileged.
Abel, a fraud examiner, interviewed Beta, a fraud suspect. No other people were present at the interview. During the interview, Abel accused Beta of committing fraud. This accusation later turned out to be erroneous, and Beta sued Abel for damages. Under these facts, which of the following statements is CORRECT?
A. If Beta sued Abel for slander, Beta would not recover damages because Abel did not publish the accusation to a third party.
B. If Beta sued Abel for libel, Beta would not recover damages because Abel believed the accusation to be true.
C. If Beta sued Abel for defamation, Beta would recover damages because Abel made public statements about Beta’s private life on an unprivileged occasion.
D. If Beta sued Abel for defamation, Beta would recover damages because Abel made an untrue statement of fact on an unprivileged occasion.
A. If Beta sued Abel for slander, Beta would not recover damages because Abel did not publish the accusation to a third party.
See pages 2.718-2.719 in the Fraud Examiner’s Manual
Generally, defamation refers to the unprivileged publication of false statements about a person that causes harm to that person’s reputation.
To recover for defamation, the plaintiff must generally prove all the following elements:
- The defendant made an untrue statement of fact.
- The statement was communicated (published) to third parties.
- The statement was made on an unprivileged occasion.
- The statement damaged the subject’s reputation.
Even though Abel made an untrue statement, it was not communicated to a third party or parties. As a result, the statement does not meet the test of defamation. So, Abel did not commit slander, and Beta would not recover any damages.
Also, Beta cannot recover damages for libel because Abel’s accusation was not in written form. It does not matter whether Abel believed the accusation to be true.
In adversarial jurisdictions, which of the following is generally NOT a purpose of opposing counsel during the cross-examination of a witness?
A. To obtain information about the witness’s testimony that was previously unknown to opposing counsel
B. To make the witness contradict former statements they made during the litigation process
C. To discredit the witness’s testimony itself
D. To diminish the importance of the witness’s testimony
A. To obtain information about the witness’s testimony that was previously unknown to opposing counsel
See pages 2.1122-2.1124 in the Fraud Examiner’s Manual
Cross-examination refers to the questioning of one side’s witness by the opposing side, and it is truly the highlight of the adversarial court system. Cross-examination, however, is uncommon in inquisitorial systems, although some civil law jurisdictions allow counsel for the parties to question witnesses in limited circumstances. Cross-examination is geared to allow opposing counsel or another questioning party either to clarify or make points at the witness’s expense. Questions during cross-examination might concern anything that might refute or embarrass the witness. During adversarial cross-examination, the witness’s credibility will constantly be scrutinized.
First, opposing counsel will seek to diminish the importance of the testimony presented by the witness. Second, opposing counsel will seek to have the witness testify in support of the opposing position by providing a series of assumptions. Third, opposing counsel will attack the witness’s report or expert opinion (as applicable) to show the inadequacies, thereby discrediting the opinion, the report, and the witness. The opposing counsel can attack or question anything that has been said or entered into court. This includes notes, working papers, affidavits, reports, and preliminary trial or discovery transcripts. Often, cross-examination creates an atmosphere of confrontation and contradiction.
Opposing counsel will generally not ask a question to which it does not already know the answer.
While the parties in adversarial jurisdictions may sometimes choose expert witnesses, normally the court chooses them.
A. True
B. False
B. False
See pages 2.1119 in the Fraud Examiner’s Manual
Most expert witnesses in adversarial proceedings are chosen by the parties to the litigation (although adversarial courts may also appoint independent experts). In adversarial proceedings, the expert and the retaining party are “allies” in the sense that legal counsel will attempt to depict the expert’s testimony in the most compelling manner during direct examination and will try to correct any issues in the expert’s testimony that the opposing party raises. However, it is important that the expert never allow their opinion or best judgment to be supplanted by that of the retaining party.
Under the ACFE Code of Professional Ethics, fraud examiners who testify as witnesses are prohibited from:
A. Testifying to opinions regarding the quality of other witnesses’ expert testimony
B. Testifying to opinions concerning the defendant’s innocence
C. Testifying that, according to the evidence, they believe the accused committed the offense
D. Testifying to opinions that the trier of fact cannot test empirically
B. Testifying to opinions concerning the defendant’s innocence
See pages 2.1122 in the Fraud Examiner’s Manual
Certain standards for fraud examiners are found in the ACFE Code of Professional Ethics. Specifically, fraud examiners are prohibited from expressing opinions as to the guilt or innocence of any person or party. This is not to say that the witness cannot testify to the badges, hallmarks, or characteristics of fraud found in the case. It also does not mean that the fraud examiner cannot testify that, based on the evidence, they believe that the accused might have committed the offense. But the ultimate guilt or innocence of any person or party is the sole responsibility of the fact finder. Typically, the fraud examiner will not be permitted to testify to the ultimate fact questions.
Which of the following statements concerning expert witnesses in inquisitorial jurisdictions is MOST ACCURATE?
A. The court may appoint expert witnesses, but generally, the parties select the primary expert witnesses.
B. Usually, the parties select a pool of expert witnesses, and the jury votes on which expert is most qualified to testify.
C. Expert testimony is generally prohibited in inquisitorial jurisdictions.
D. Generally, the court is primarily responsible for appointing expert witnesses.
D. Generally, the court is primarily responsible for appointing expert witnesses.
See pages 2.1119 in the Fraud Examiner’s Manual
In most inquisitorial jurisdictions, the primary experts are appointed by the court. Experts are subject to various examinations and might have to conduct their own examinations of witnesses. Usually, all the expert’s activities related to the case are controlled by the judge, who determines the scope of the expert’s analysis, the expert’s authority to access certain items of evidence, whom the expert can interview, and several other functions. Because some jurisdictions allow parties to submit testimony or evidence from their own experts in addition to the court-appointed expert, the latter might need to interview the parties’ experts. The expert should carefully follow the judge’s instructions, especially because the instructions are usually made available to the parties of the proceeding.
The primary reason for maintaining the chain of custody is to prevent opposing parties from accessing an item of evidence without a court order.
A. True
B. False
B. False
See pages 2.1025 in the Fraud Examiner’s Manual
The primary reason for maintaining the chain of custody on an item of evidence is to establish that the evidence has not been altered or changed. If evidence is subject to change over time or susceptible to alteration, the offering party might need to establish that the evidence has not been altered or changed from the time it was collected through its production in court. This is done by establishing a chain of custody. Thus, the chain of custody can be an important factor in establishing authenticity.
The chain of custody is both a process and a document that memorializes (1) who has had possession of an object and (2) what they have done with it.
During a criminal trial involving allegations of corruption, the prosecution introduces a diagram illustrating the organizational structure of a company allegedly involved in the corruption. The diagram is an example of:
A. Demonstrative evidence
B. Real evidence
C. Direct evidence
D. Documentary evidence
A. Demonstrative evidence
See pages 2.1002 in the Fraud Examiner’s Manual
There are three basic forms of evidence: testimonial, real, and demonstrative. Testimonial evidence refers to the oral or written statements made by witnesses under oath. Real evidence refers to physical objects that played a part in the issues being litigated. Demonstrative evidence is a tangible item that illustrates some material proposition (e.g., a map, a chart, or a summary). Demonstrative evidence differs from real evidence in that demonstrative evidence was not part of the underlying event; it was created specifically for the trial. Its purpose is to provide a visual aid for the fact finder. Nonetheless, demonstrative evidence is evidence and can be considered by the fact finder in reaching a verdict.
While conducting a fraud examination, Black, a Certified Fraud Examiner (CFE), obtained a document in Year 1. Since Black obtained the document, several individuals have had it in their possession. In Year 2, the document was introduced at trial. However, the document’s authenticity was questioned because there was no record of who had possession of it and what they did with it. The question concerning the document’s authenticity is based on a failure to maintain _____________.
A. The best form of the evidence
B. The chain of custody
C. The attorney’s evidence records
D. Who validated the evidence
B. The chain of custody
See pages 2.1025 in the Fraud Examiner’s Manual
If evidence is subject to change over time or susceptible to alteration, the offering party might need to establish that the evidence has not been altered or changed from the time it was collected through its production in court. This is done by establishing a chain of custody. Thus, the chain of custody can be an important factor in establishing authenticity.
The chain of custody is both a process and a document that memorializes (1) who has had possession of an object and (2) what they have done with it; it is simply a means of establishing that there has not been a material change or alteration to a piece of evidence.
Which of the following is a basic exception for the requirement that a police officer must obtain a search warrant before conducting a search of a person, location, or vehicle for evidence of a crime?
A. Searches where there is “reasonable belief” in the suspect’s guilt
B. Searches where there is circumstantial proof that the suspect is guilty
C. Searches when a confession has been made
D. Searches conducted pursuant to a valid, voluntary consent
D. Searches conducted pursuant to a valid, voluntary consent
See pages 2.715 in the Fraud Examiner’s Manual
Even if a warrant is technically required, there are a number of recognized exceptions to the warrant requirement. Two key exceptions are consent searches and evidence in plain view.
If employees have a duty to cooperate during an internal investigation as part of the employer-employee relationship, the duty exists if what is requested from them is reasonable.
A. True
B. False
A. True
See pages 2.701-2.702 in the Fraud Examiner’s Manual
In most jurisdictions, a duty to cooperate exists in every employer-employee relationship, but such duties vary between jurisdictions. Generally, the duty to cooperate extends to workplace investigations; therefore, employees have a duty to cooperate during an internal investigation if what is requested from them is reasonable.
In most common law systems, a party can introduce relevant exhibits as evidence at trial even if the items are not established as authentic.
A. True
B. False
B. False
See pages 2.1006 in the Fraud Examiner’s Manual
In common law systems using adversarial processes, exhibits—the tangible objects presented as evidence—are inadmissible unless they are relevant and established as authentic. Thus, to be admissible at trial, evidence, other than testimonial evidence, must be properly authenticated; that is, the party offering the item must produce some evidence (e.g., testimony from a person who has firsthand knowledge) to show it is, in fact, what the party says it is and that it is in the same condition as when it was seized. If an exhibit cannot be authenticated, it will not be admitted even if it is plainly relevant.
If, in a country with comprehensive whistleblower protection laws, an employee qualifies as a whistleblower for reporting unlawful conduct by their employer, then the employer cannot terminate the whistleblowing employee for any reason, including their engagement in an unrelated fraud.
A. True
B. False
B. False
See pages 2.704 in the Fraud Examiner’s Manual
Many jurisdictions have whistleblower laws designed to encourage individuals to bring forth complaints of wrongdoing by providing protections for those who report unlawful conduct. These laws shield employees who report their employers for misconduct by protecting them from any adverse employment action or retaliatory action from their employers.
Whistleblower laws do not, however, prevent individuals from being terminated for engaging in unrelated fraudulent behavior.
In common law jurisdictions, the litigation privilege applies only to documents and things prepared in anticipation of litigation.
A. True
B. False
A. True
See pages 2.1032-2.1034 in the Fraud Examiner’s Manual
Many common law jurisdictions have a litigation privilege that protects materials prepared in anticipation of litigation. Thus, the litigation privilege applies only to documents and things prepared in anticipation of litigation.
This protection prevents the disclosure of communications made, and documents prepared, for the purpose of litigation. Also, the protection may extend to communications of, and documents created by, third-party agents (e.g., consultants or fraud examiners) in preparation for litigation.
The litigation privilege arises once litigation is reasonably anticipated. Accordingly, communication is only privileged under the litigation privilege if litigation was contemplated at the time the communication was created. Therefore, the privilege does not cover documents that came into existence before litigation was contemplated.
The European Union’s (EU) General Data Protection Regulation (GDPR) generally requires an organization to notify all affected data subjects without undue delay if a data breach is likely to result in a high risk to their rights and freedoms.
A. True
B. False
A. True
See pages 2.727 in the Fraud Examiner’s Manual
The European Union’s (EU) General Data Protection Regulation (GDPR) generally requires an organization to notify all affected data subjects without undue delay if the data breach is likely to result in a high risk to their rights and freedoms.
The purpose of the authentication requirement in most common law systems is to ensure that hearsay is not admitted into evidence.
A. True
B. False
B. False
See pages 2.1006 in the Fraud Examiner’s Manual
In common law systems using adversarial processes, exhibits—the tangible objects presented as evidence—are inadmissible unless they are relevant and established as authentic. The authentication requirement serves to ensure that evidence is what the party claims it is and that it is genuine, not a forgery.
Which of the following is an element that must be present for communications between an attorney and the attorney’s client to be protected by a legal professional privilege?
A. Purpose of the communications was to seek or provide legal advice
B. Intent to keep the communications confidential
C. Communication between a legal advisor and a client
D. All of the above
D. All of the above
See pages 2.1029 in the Fraud Examiner’s Manual
Legal professional privileges protect the communications between professional legal advisors (e.g., solicitor, barrister, or attorney) and their clients. These privileges are designed to encourage open and honest communications between legal professionals and their clients, and they go by many names depending on the jurisdiction (e.g., attorney-client privilege, legal advice privilege, or solicitor-client privilege).
The requirements for the application of these privileges vary among jurisdictions, but generally, the following elements must be present for communications between an attorney and the attorney’s client to be protected by a legal professional privilege:
- A communication between a legal professional and a client
- The communication was made to seek or give legal advice
- The parties intended the communications to be confidential
To be protected under a legal professional privilege, it is typically not necessary that the communication take place after a lawsuit has been filed.
The key issue to consider when assessing the existence of a reasonable expectation of privacy is whether a reasonable person would expect the area or item to be free from intrusion.
A. True
B. False
A. True
ee pages 2.705 in the Fraud Examiner’s Manual
The key issue to consider when assessing the existence of a reasonable expectation of privacy is whether a reasonable person would expect the area or item to be free from intrusion. Employees tend to regard purses, briefcases, and other personal effects as personal items that they reasonably expect to be private. An employee does not need to have an ownership interest in, or legal custody over, the area or item to have a reasonable expectation of privacy in it. Thus, even if an employer owns the office where an employee works, the employee can still have a reasonable expectation of privacy in parts of the office.A. True
A client hires an attorney in a jurisdiction that provides a legal professional privilege. If the attorney shares client communications that are confidential and subject to the legal professional privilege with an outside consultant hired to help provide legal advice to the attorney’s client, then the client will automatically lose any protection the legal professional privilege provided over the communications.
A. True
B. False
B. False
See pages 2.1029-2.1030 in the Fraud Examiner’s Manual
Legal professional privileges are not absolute; they are subject to waiver. Because these privileges only protect confidential communications, the protection they provide will be waived for communications disclosed to third parties who have little or nothing to do with the client’s pursuit of legal representation because such disclosures demonstrate a lack of confidentiality.
Generally, waiver occurs when the client, who holds the privilege, voluntarily discloses (or consents to or encourages someone else into disclosing) any significant part of the privileged communications. Although the client holds the privilege, the privilege can be waived by the client’s attorney or a third party—someone who is neither the attorney nor the client.
Although legal professional privileges only apply to confidential communications between a legal representative and the legal representative’s client, in most jurisdictions, the protection afforded by these privileges extends to communications with third-party consultants hired to help provide legal advice to the client (e.g., fraud examiners, accountants, bankers, or other experts). Thus, waiver does not occur when an attorney shares privileged information with an outside consultant hired in a role that concerns the client’s pursuit of legal representation and when the communication is made for the purpose of effectuating legal representation for the client.
In common law jurisdictions with civil laws for defamation and invasion of privacy, under which cause of action can an investigator be held liable for a TRUE statement made about a suspect?
A. Defamation
B. Intrusion upon seclusion
C. Slander
D. Public disclosure of private facts
D. Public disclosure of private facts
See pages 2.721-2.722 in the Fraud Examiner’s Manual
Invasion of privacy laws concern a person’s right to keep their life private and free from intrusion, and in many common law countries, invasion of privacy is a civil wrong that can be addressed by a court through a lawsuit.
The two most common forms of invasion of privacy applicable to fraud examinations are intrusion into an individual’s private matters and publicity of private facts. The civil wrong regarding intrusion into an individual’s private matters (often referred to as intrusion upon seclusion) occurs when an individual intentionally intrudes into another individual’s private matters and the intrusion would be highly offensive or objectionable to a reasonable person.
Public disclosure of private facts occurs when one party makes public statements about another party’s private life that are not of public concern. Unlike the requirements to establish a claim for defamation, liability for the public-disclosure-of-private-facts cause of action can arise even if the statements at issue are true. The key to this cause of action is that the information must be private in nature and not a matter of public interest.
Which of the following must a plaintiff show to recover for a claim of false imprisonment?
A. The defendant knew their conduct was illegal.
B. The defendant was a law enforcement officer.
C. The defendant restrained the plaintiff without consent or legal justification.
D. The defendant was not protected under the qualified business privilege.
C. The defendant restrained the plaintiff without consent or legal justification.
See pages 2.730-2.731 in the Fraud Examiner’s Manual
False imprisonment is the unlawful restraint by one person of the physical liberty of another without consent or legal justification. To recover for a claim of false imprisonment, the plaintiff generally must prove all the following elements:
- The defendant used words or actions intended to restrain the plaintiff.
- The defendant’s words or actions resulted in the restraint of the plaintiff without the plaintiff’s consent (i.e., against the plaintiff’s will) and without legal justification.
- The plaintiff was aware that they were being restrained.
A claim of false imprisonment might arise if an employee is detained in any way during a search or interview. Generally, an employer is entitled to question an employee at work about a violation of company policy without incurring liability if the employee submits to the questioning voluntarily—that is, not as a result of threats or force.
Which of the following statements about the consent exception to the requirement that government agents must obtain a warrant before conducting a search for evidence of a crime is INCORRECT?
A. To be valid, an individual’s consent to a search by government agents must be voluntary.
B. Generally, government agents do not have to warn subjects that they have a right to refuse to consent to a search.
C. Even if obtained by bribery or force, consent to search constitutes a valid waiver of the person’s right to be free from unreasonable searches.
D. Government agents do not need a warrant to perform a search if a person with proper authority consents to the search.
C. Even if obtained by bribery or force, consent to search constitutes a valid waiver of the person’s right to be free from unreasonable searches.
See pages 2.716 in the Fraud Examiner’s Manual
Consent is a recognized exception to the requirement that government agents must obtain a warrant before they search a person, location, or vehicle for evidence of a crime. Individuals are always free to consent to searches. If a suspect consents to a search or seizure by police or a government agent, then the consent eliminates the need for a search warrant. That is, the consent to search serves to waive the person’s right to be free from government searches. Thus, the government does not need a warrant to perform a search if a person with proper authority consents to a search.
To be valid, an individual’s consent to a search or seizure must be voluntary. Consents to searches or seizures by government agents obtained by force, duress, or bribery are generally held to be involuntary and invalid; therefore, such consent does not constitute a valid waiver of the person’s right to be free from unreasonable searches. Jurisdictions are mixed, however, as to whether consents obtained by deceit constitute valid waiver.
Also, there is generally no requirement that government agents warn suspects that they have a right to refuse consent.
During cross-examination of an expert witness, the questioning party often uses the “Is it not true?” and “Would you agree with me?” approach. This technique of cross-examination is used to:
A. Make the witness appear to be a sounding board by generally agreeing with the questioning party’s position.
B. Ease the witness into a feeling of false security.
C. Confuse the witness in the hope that they might contradict themselves.
D. Show that the witness’s bias prevents them from objectively considering an issue or situation.
A. Make the witness appear to be a sounding board by generally agreeing with the questioning party’s position.
See pages 2.1126, 2.1128 in the Fraud Examiner’s Manual
During cross-examination, the questioning party might employ various methods to discredit a witness or diminish the importance of the witness’s testimony. The sounding board cross-examination method uses the witness as a sounding board to reacquaint the judge or jury with the favorable aspects of the questioning party’s theory. This technique often uses the “Is it not true?” and “Would you agree with me?” approach. Constant, nonstop agreement is used to intimidate the witness. If the witness agrees with various questions raised by the questioning party, the judge or jury might interpret the agreement to mean that the witness generally concurs with the questioning party’s position.
Waiver of a legal professional privilege occurs when a client shares privileged information with an outside party who has nothing to do with the client’s pursuit of legal representation.
A. True
B. False
A. True
See pages 2.1029-2.1030 in the Fraud Examiner’s Manual
Legal professional privileges are not absolute; they are subject to waiver. Because these privileges only protect confidential communications, the protection they provide will be waived for communications disclosed to third parties who have little or nothing to do with the client’s pursuit of legal representation because such disclosures demonstrate a lack of confidentiality.
Generally, waiver occurs when the client, who holds the privilege, voluntarily discloses (or consents to or encourages someone else into disclosing) any significant part of the privileged communications. Although the client holds the privilege, the privilege can be waived by the client’s attorney or a third party—someone who is neither the attorney nor the client.
Which of the following BEST describes the purpose of expert testimony in judicial proceedings?
A. To provide evidence based on personal knowledge and perceptions of the events at issue
B. To assist in proving and establishing one essential circumstance among many others
C. To assist the trier of fact to understand the evidence or determine the fact in issue
D. None of the above
C. To assist the trier of fact to understand the evidence or determine the fact in issue
See pages 2.1105 in the Fraud Examiner’s Manual
Experts can serve one of two roles in the trial process: testifying expert or consulting expert. Testifying expert witnesses give technical testimony when specialized knowledge is needed to help the fact finder understand evidence or determine a fact in issue.
Abel is an auditor who works for XYZ, a private company. Abel suspects that Beta, an employee for XYZ, has embezzled money from XYZ. Abel plans to conduct an internal investigation into the missing funds, and during the investigation, Abel plans to interview Beta. Based on these facts, which of the following is the MOST ACCURATE statement?
A. XYZ cannot fire Beta for refusing to participate in the interview because of whistleblower protections.
B. Beta has the right to have an attorney present at any interview conducted by Abel.
C. Beta likely has a duty to cooperate with the investigation as part of the employer-employee relationship.
D. Before interviewing Beta, Abel must inform Beta of the right to remain silent.
C. Beta likely has a duty to cooperate with the investigation as part of the employer-employee relationship.
See pages 2.701-2.702 in the Fraud Examiner’s Manual
In most jurisdictions, a duty to cooperate exists in every employer-employee relationship, but such duties vary between jurisdictions. Generally, the duty to cooperate extends to workplace investigations; therefore, employees have a duty to cooperate during an internal investigation if what is requested from them is reasonable.
Michael, a fraud suspect, confesses to a fraud. During Michael’s trial for the fraud, the government introduces the confession as evidence of Michael’s intent to commit the fraudulent act for which he is charged. What kind of evidence is Michael’s confession?
A. Testimonial
B. Circumstantial
C. Character
D. Direct
D. Direct
See pages 2.1002 in the Fraud Examiner’s Manual
There are two basic categories of admissible evidence: direct evidence and circumstantial evidence. Direct evidence is evidence that tends to prove or disprove a fact in issue directly, such as eyewitness testimony or a confession. Circumstantial evidence is evidence that tends to prove or disprove facts in issue indirectly, by inference.
Lyn is an employee who works in a jurisdiction that prohibits unreasonable workplace searches and surveillance in areas or items where employees have a reasonable expectation of privacy. In which of the following items is Lyn LEAST LIKELY to have a reasonable expectation of privacy?
A. A personal planner kept in the employee’s desk drawer
B. A company-issued desktop or laptop computer
C. A purse that is stored in the employee’s cubicle
D. An employee-owned tablet brought to the office from home
B. A company-issued desktop or laptop computer
See pages 2.705 in the Fraud Examiner’s Manual
Different countries often have very different approaches to the issue of workplace privacy. In some jurisdictions, privacy laws generally prohibit unreasonable workplace searches and surveillance in areas where employees have a reasonable expectation of privacy. Depending on the circumstances, an employee might have a reasonable expectation of privacy in a desk drawer, a file cabinet, a locker, or even an entire office. Reasonable expectations of privacy can also attach to communications, such as data stored on hard drives and other electronic communications like phone calls, emails, and text messages.
The key issue to consider when assessing the existence of a reasonable expectation of privacy is whether a reasonable person would expect the area or item to be free from intrusion. Employees tend to regard purses, briefcases, and other personal effects as personal items that they reasonably expect to be private. An employee does not need to have an ownership interest in, or legal custody over, the area or item to have a reasonable expectation of privacy in it. Thus, even if an employer owns the office where an employee works, the employee can still have a reasonable expectation of privacy in parts of the office.
Another important factor is the amount of control an individual exercises over an area or item. If an employee has exclusive control over an area or item, this tends to show that the employee has a reasonable expectation of privacy in it.
In this case, the employee is more likely to have a reasonable expectation of privacy in their tablet, purse, and personal planner because the employee owns and exercises exclusive control over these items. Without a company policy to the contrary, a reasonable person would not expect their employer to search or monitor personal items brought from home and stored in an area that is generally free from intrusion. An employee would be less likely to have a reasonable expectation of privacy in a company-issued computer to which the employee does not retain exclusive control.
The hard drive of a compromised computer system was given to Brad, a forensic examiner, for analysis. If Brad cannot verify who gave him the computer’s hard drive for analysis, then:
A. The hard drive must be imaged.
B. The chain of custody is broken.
C. The best-evidence rule is invoked.
D. The hard drive must be rehashed.
B. The chain of custody is broken.
See pages 2.1025 in the Fraud Examiner’s Manual
If evidence is subject to change over time or susceptible to alteration, the offering party might need to establish that the evidence has not been altered or changed from the time it was collected through its production in court. This is done by establishing a chain of custody. Thus, the chain of custody can be an important factor in establishing authenticity.
The chain of custody is both a process and a document that memorializes (1) who has had possession of an object and (2) what they have done with it; it is simply a means of establishing that there has not been a material change or alteration to a piece of evidence.