SYS-CON MEDIA Authors: Carmen Gonzalez, Sean Houghton, Glenn Rossman, Ignacio M. Llorente, Xenia von Wedel

News Feed Item

KPMG Report: More Than 50 Percent Of Executives Surveyed Say Companies Have Limited Or No Protocols For Cross Border Investigations

Investigating White Collar Crime across the Globe: Tips, Strategies and Missteps

NEW YORK, Jan. 6, 2014 /PRNewswire/ -- Despite the fact that an inadequate or poorly conducted inquiry can cause a company to run afoul of the law, damage corporate reputations, or unravel a case, more than fifty percent of the executives surveyed in the new KPMG report, Cross Border Investigations – Are You Prepared for the Challenge?, stated they have limited protocols in place and insufficient resources to conduct cross-border investigations. 

This revelation comes at a time when data and employee privacy issues, often triggered by investigations, are dominating the headlines and major corporations are facing increased regulatory scrutiny around anti-bribery and corruption legislation such as the foreign corrupt practices act, anti-money laundering and other compliance matters that often trigger cross border investigations.  

"Conducting cross-border investigations requires careful planning and precise execution, but the reality is many companies don't have adequate procedures in place to deal with these complex investigations," said Phil Ostwalt, U.S. Forensic Network Leader for Investigations, KPMG LLP.  "Couple the absence of planning with legal and cultural differences and you can have one of the biggest challenges facing global corporations."

The KPMG cross border report outlines several, often counterintuitive, tips to help compliance professionals, corporate investigators and board members keep their investigations on track.   Key insights include:

Language is important: In some countries using words such as "investigation," "whistleblower," "informant" or "witness" may elicit unexpected or unwarranted responses that can have a chilling effect on the process.

More generic words such as "review," "analysis" or "discussion" can be used in place of investigation, while words such as "employee" or "colleague" are often more effective than whistleblower or informant.

In some jurisdictions, it can be illegal for companies to investigate alleged employee misconduct because the local government is considered the exclusive investigator.

Don't find yourself on the wrong side of the law: Foreign data privacy laws and regulations often prevent investigators from removing data out of the jurisdiction.   In some Asian countries, many businesses are state owned or controlled, which may trigger states secrets laws and greatly impact the kind of data that can be collected and reviewed.

Crossing the border with data required to conduct the investigation can trigger an investigation of the investigator.

Anticipate lots of sealed lips: Loyalties differ by culture and some employees may be hesitant to speak out against a countryman for the benefit of a foreign company.  Additionally, in some nations it is against cultural norms for employees to say something negative about a person with a senior position in their company.

Cultural differences remain one of the top three challenges in conducting cross-border investigations, which is up from twenty six percent in 2007, to thirty seven percent in 2013.

Don't get lost in translation:  Work with people who understand the local language and cultural nuances.  Investigation teams who do not have local language skills may miss critical aspects of key documents or interviews conducted in local language.

More than a third of the respondents in KPMG's survey stated that language differences present a challenge in cross border investigations.

Top 3 Cross Border Investigation Challenges (Respondents selected up to 3):

  • Privacy or information issues (46 percent)
  • Lack of internal investigation resources (42 percent)
  • Cultural differences (37 percent)
  • The legal or regulatory environment (35 percent)
  • Language differences (32 percent)
  • Lack of robust publicly available information (23 percent)
  • Lack of cooperation from others in their organization (19 percent)
  • Identification and retention of competent external resources (14 percent)
  • Personal security of those involved in investigations (9 percent)
  • Lack of cooperation from government agencies (5 percent)

"The challenges and importance of an effective investigation, particularly in a global setting, are often not fully appreciated," said Richard Girgenti, U.S. Forensic Network Leader, KPMG LLP. "The failure to get it right can only serve to exacerbate the underlying problem."

About the Report
Data for Cross Border Investigations – Are You Prepared for the Challenge? was gathered by KPMG International member firms' forensic specialists in Africa, Asia, Australia, New Zealand, North America and Western Europe and sixty corporate executives responsible for their organization's cross border investigations.

About KPMG LLP
KPMG LLP, the audit, tax and advisory firm (www.kpmg.com/us), is the U.S. member firm of KPMG International Cooperative ("KPMG International"). KPMG International's member firms have 155,000 professionals, including more than 8,600 partners, in 155 countries.

About KPMG International
KPMG is a global network of professional firms providing Audit, Tax and Advisory services. We operate in 155 countries and have more than 155,000 people working in member firms around the world. The independent member firms of the KPMG network are affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. Each KPMG firm is a legally distinct and separate entity and describes itself as such.

Contact:
Anayo Afolabi
KPMG LLP
201-307-8135
[email protected]

SOURCE KPMG LLP

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
"ElasticBox is an enterprise company that makes it very easy for developers and IT ops to collaborate to develop, build and deploy applications on any cloud - private, public or hybrid," stated Monish Sharma, VP of Customer Success at ElasticBox, in this SYS-CON.tv interview at DevOps Summit, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The term culture has had a polarizing effect among DevOps supporters. Some propose that culture change is critical for success with DevOps, but are remiss to define culture. Some talk about a DevOps culture but then reference activities that could lead to culture change and there are those that talk about culture change as a set of behaviors that need to be adopted by those in IT. There is no question that businesses successful in adopting a DevOps mindset have seen departmental culture change, ...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
"SAP had made a big transition into the cloud as we believe it has significant value for our customers, drives innovation and is easy to consume. When you look at the SAP portfolio, SAP HANA is the underlying platform and it powers all of our platforms and all of our analytics," explained Thorsten Leiduck, VP ISVs & Digital Commerce at SAP, in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.