About the Contributors.
Chapter 1 Managing Corruption Risk.
You Are Not Alone.
Bribery and Kickbacks.
Developing Effective Compliance Programs.
Performing Due Diligence.
Chapter 2 What Is Anti-Corruption?
Anti-Corruption Detection and Prevention.
Critical Elements of an Effective Compliance Program.
Governance and Oversight.
Chapter 3 U.S. Efforts to Combat Global Corruption.
The Emergence Of Non Government Organizations.
World Trade Organization.
Global Forum On Fighting Corruption.
International Financial Institutions.
International Chamber Of Commerce.
Global Corporate Governance Forum.
The Role Of Civil Society.
The Emerging Markets.
Chapter 4 U.S. Laws Governing Corruption.
Racketeer Influenced and Corrupt Organizations Act.
Sherman Antitrust Act.
Anti-Kickback Act of 1986.
Economic Espionage Act of 1996.
Chapter 5 The Evolution of the Foreign Corrupt Practices Act.
Third Party Payments.
Sanctions Against Bribery.
Chapter 6 Internal Controls and Accounting Provisions of FCPA.
FCPA Accounting Provisions.
Case Study: Rolling on a River.
Chapter 7 Do Not Crimp: The Need for Oversight of Foreign Operations.
Pitfalls of Emerging Markets.
Education and Communication.
Extending the Tone from the Top Beyond the Borders.
Case Study: Bribes in the USSR.
Chapter 8 The Human Factor.
Why Focus on Fraud and Corruption Risk?
Behavioral Root Causes of Fraud and Corruption.
Psychology of Fraud Perpetrators.
Understanding Management Fraud.
Chapter 9 Corporate Governance: The Key to Unmasking Corrupt Activity.
Enterprise Risk Management: Create Stronger Governance and Corporate Compliance.
Ascertain Risk Areas.
Establishing Procedures to Mitigate Risk.
Perform a Periodic Assessment.
Blowing the Whistle on Corporate Fraud.
Chapter 10 Whistle-Blower Programs.
Pulling Out the Ear Plugs.
Understanding Stakeholders and their Needs.
Steps of the MACH Process.
Monitoring the MACH Process.
Chapter 11 Document Retention.
Create, Communicate, Monitor.
Reduce Risk Through Technology.
The Most Common Computer-Related Crimes.
The Value of Stored Data.
Chapter 12 Information Security: Intellectual Property Theft Is Often the Result of Government Corruption.
Information Security Audit.
Classification of Information.
Division of Responsibilities and Duties are an Effective Strategy in Protecting Trade Secrets.
Information Security Control Officers or Custodians.
Use of Confidential or Proprietary Markings.
Education and Training.
Solicitations for Information.
Seminar/Tradeshow/Off-site Meetings Policy.
Joint Venture/Vendor/Subcontractor Procedures.
Contractual Provisions with End Users.
International Protection Issues.
Information Security Policy.
Chapter 13 Anti-Money Laundering: The USA PATRIOT Act.
Current State of AML in the Global Marketplace.
Case Study: The Boys from Brazil.
Chapter 14 Procurement Fraud: Detecting and Preventing Procurement and Related Fraud.
Defective Pricing and Price Fixing.
Case Study 1 – Employee Fraud.
Case Study 2 – Vendor Kickbacks and Collusion.
Chapter 15 Construction Fraud: Monitoring, Mitigating and Investigating Construction Fraud.
Common Construction Company Fraud Schemes.
Combating Fraud and Corruption.
Strengthen Your Internal Controls.
Chapter 16 Special Investigations: How to Investigate Allegations of Corruption.
An Interested Party: The Auditor.
The Special Investigation.
Chapter 17 Navigating the Perils of the Global Marketplace.
Data Collection and Processing.
Transborder Data-Flow Issues.
Chapter 18 Case for Collective Action: The World Bank Initiative.
Why Collective Action Against Corruption?
Different Views of Corruption.
Business Costs of Corruption.
Costs of Corruption for Industries, Economies and Countries.
Different Views of the Private Sector.
Chapter 19: Leveling the Playing Field.
Book Research Summary.