Abstract
In this chapter, the day-to-day activities of corporate investigators are discussed. What are the investigative methods that are used by corporate investigators and how does the investigative process take shape? In this chapter, interview data, case study material and observation data are used to unravel the daily activities of corporate investigators. As becomes apparent, corporate investigators provide a comprehensive service. The investigations may, in this way, stay fully in the private legal sphere, without any criminal justice involvement. Within this private legal sphere, corporate investigators can move with considerable autonomy, providing a specialised and custom-made service to clients. Reasons for the popularity of corporate investigations are discussed in this chapter, as well as the full investigative process and corporate investigators’ relationship with their client.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
See, for example, the report of KRO Brandpunt, Bespied door de baas (1 June 2014) as an example of the public image of corporate investigations. Available on http://brandpunt.kro.nl/seizoenen/2014/afleveringen/01-06-2014.
- 2.
See articles 141 and 142 of the Dutch Code of Criminal Procedure (Wetboek van Strafvordering—WvSv). Article 141 charges the prosecution, police officers, military police and special investigative agencies of the ministries with the investigation of criminal offences. Article 142 states that the Minister of Justice and security may define additional persons as ‘special investigating officer’.
- 3.
Because the employee might not grant access willingly, this is sometimes contested in court as improper. However, case law supports the legality of the use of corporate investigation methods (see, e.g., ECLI:NL:RBAMS:2016:8313, in which the defendant claimed that the private investigations were illegal. The (criminal) court dismissed this argument).
- 4.
This research also avoids ‘criminal law terminology’, as the use of these terms would be incorrect in the context of corporate investigations. An involved person for example is not a suspect in the sense of a criminal procedure (and as such does not enjoy the same rights). The adversarial principle could be interpreted as being a criminal justice term (as it is a leading principle of law in criminal proceedings); however, in the Dutch legal system, this is a term that is used in all legal proceedings, from administrative to civil to criminal, and it is thus not specifically linked to the criminal justice system.
- 5.
See the previous Chapter 2 for a general overview of legal frameworks applicable to the different professional groups of investigators.
- 6.
As distinct from broader investigations into the organisation, not focusing on an individual but on an issue.
- 7.
Although this circumstance alone is not sufficient proof, as people tend to use each other’s key cards even when this is prohibited by the internal code of the organisation.
- 8.
This does not necessarily mean that the blacklist does not comply. Many larger organisations have a privacy officer who is better informed on these issues than the respondents mentioned here.
- 9.
For more information, see Chapter 2 of this book.
- 10.
These are not necessarily corporate investigators. Training programmes are often provided by digital specialists.
- 11.
See Chapter 5 for more on public-private relations and information sharing.
- 12.
This is based on the former Privacy law (see articles 33, 34 and 43 WBP). Revisions have been made to the privacy code of conduct as a result of the new EU-wide privacy regulation. These revisions are currently under consideration by the Data Protection Authority. In the meantime, the privacy code of conduct ‘should be read in accordance with the GDPR’ (Autoriteit Persoonsgegevens, n.d.-c).
- 13.
There are many (mostly USA) textbooks, e-learnings and other professional information available on different approaches and interview techniques (and on corporate investigations more generally; see, e.g., Brian, McNeil, & Demsky, 2017). In this section, the broader outlines of the interview as a source of information are described—the aforementioned very detailed instructions on how to interview are beyond the scope of this chapter. Additionally, the fieldwork reveals that many corporate investigators feel that interviewing can be taught but much importance is given to experience and following one’s own instincts. Although respondents state that there are no standard ways to interview, stressing the importance of flexibility, they seem to broadly follow the process as delineated in this section.
- 14.
Unsurprisingly, an investigative interview follows some of the same basic rules followed by social scientists when interviewing respondents (Baarda, de Goede, & van der Meer-Middelburg, 1996).
- 15.
This research has found no evidence of corporate investigators abusing their power by mistreating the interviewee. This does not mean, however, that such a situation never occurs.
- 16.
Interestingly, in this sense the corporate investigations process follows civil law logic, rather than the logic of criminal investigations. In the civil law system, something is considered a fact when it is presented and not contested by either party (see also Chapter 4 of this book).
- 17.
Not every investigation yields enough information to answer the questions asked in the assignment. When this is the case, a report is made about the findings and the lack of certainty is stated.
- 18.
For example, because other norm violations are discovered within the organisation during the investigations that warrant their own separate investigations (often referred to as ‘by-catch’) or because business partners of the organisation want to have internal investigations as well to ensure they had nothing to do with the norm violation.
- 19.
There are some standards provided for forensic accountants , but not all corporate investigators use them.
- 20.
As we have seen in Chapter 2, investigative costs are also important for in-house departments; however, they are usually justified in more general terms (e.g. in a yearly report, calculated over a whole year) and not in every investigation.
- 21.
See, for example, a 2012 report by Grant Thornton for the municipality of Eindhoven (https://eindhoven.raadsinformatie.nl/document/184307/1/Bijlage_5_Grant_Thornton_eindrapport_TA), a 2015 report by Hoffmann for the municipality of Urk (http://www.omroepflevoland.nl/SiteFiles/Doc/Rapport_onderzoek_naar_lek_E48A8C53F9EC9A01C1257DE400371DDF.pdf), a 2012 report by Deloitte for Avalex (http://www.politiekdelft.nl/avalex_rapport_deloitte_20120330.pdf) or (in a more limited way) the 2015 report of De Brauw for NS (https://zoek.officielebekendmakingen.nl/blg-614489.pdf).
- 22.
Neither can the police of course, although law enforcement authorities do have the power to summon documents, enter buildings without consent (when this is approved by a prosecutor or judge), or use other more or less coercive measures.
References
Autoriteit Persoonsgegevens. (n.d.-a). Welke voorwaarden gelden voor de controle van werknemers? Retrieved from https://www.autoriteitpersoonsgegevens.nl/nl/onderwerpen/werk-uitkering/controle-van-personeel.
Autoriteit Persoonsgegevens. (n.d.-b). Cameratoezicht op de werkplek. Retrieved from https://autoriteitpersoonsgegevens.nl/nl/onderwerpen/cameratoezicht/cameratoezicht-op-de-werkplek.
Autoriteit Persoonsgegevens. (n.d.-c). Gedragscode en AVG. Retrieved from https://autoriteitpersoonsgegevens.nl/nl/onderwerpen/politie-en-justitie/particuliere-recherche.
Autoriteit Persoonsgegevens. (n.d.-d). Zwarte lijst. Retrieved from https://autoriteitpersoonsgegevens.nl/nl/zelf-doen/zwarte-lijst.
Autoriteit Persoonsgegevens. (2018). AVG-handleiding protocol zwarte lijst. Retrieved from https://autoriteitpersoonsgegevens.nl/sites/default/files/atoms/files/avg-handleiding_protocol_zwarte_lijst.pdf.
Baarda, D. B., de Goede, M. P. M., & van der Meer-Middelburg, A. G. E. (1996). Basisboek Open interviewen. Praktische handleiding voor het voorbereiden en afnemen van open interviews. Groningen: Stenfert Kroese.
Balter, R., & Bellissard, L. (2003). A ScalAgent Distributed Technologies white paper: Scalable and flexible mediation infrastructure for networked smart devices. Échirolles: ScalAgent Distributed Technologies.
Brian, B. D., McNeil, B. F., & Demsky, L. (2017). Internal corporate investigations (4th ed.). Chicago: ABA Book Publishing.
Coburn, N. F. (2006). Corporate investigations. Journal of Financial Crime, 13(3), 348–368.
Dorn, N., & Meerts, C. (2009). Corporate security and private settlement: An informal economy of justice. In J. Shapland & P. Ponsaers (Eds.), The informal economy and connections with organised crime: The impact of national social and economic policies (pp. 113–129). Amsterdam: Boom Publishers.
Falk Moore, S. (1973). Law and social change: The semi-autonomous social field as an appropriate subject of study. Law & Society Review, 7(4), 719–746.
Gill, M. (2013). Engaging the corporate sector in policing: Realities and opportunities. Policing, 7(3), 273–279.
Gill, M., & Hart, J. (1997). Exploring investigative policing: A study of private detectives in Britain. British Journal of Criminology, 37(4), 549–576.
Grant Thornton. (2010). Grant Thornton Forensic & Investigation Services B.V. Reglement onderzoekswerkzaamheden. Rotterdam: Grant Thornton.
Loader, I., & White, A. (2017). How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance, 11(2), 166–174.
Meerts, C. A. (2013). Corporate security: Private justice? (Un)settling employer-employee troubles. Security Journal, 26(3), 264–279.
Meerts, C. A. (2014a). Over pragmatisme en strategie. Tijdschrift voor Criminologie, 56(4), 115–137.
Meerts, C. A. (2014b). Corporate security: Governing through private and public law. In K. Walby & R. Lippert (Eds.), Corporate security in the 21st century: Theory and practice in international perspective (pp. 97–115). Basingstoke: Palgrave Macmillan.
NIVRA/NOvAA. (2010). NBA-handreiking 1112. Praktijkhandleiding persoonsgerichte onderzoeken voor accountants-administratieconsulenten/registeraccountants. Amsterdam: Koninklijke Nederlandse Beroepsorganisatie voor Accountants.
NVb. (2015). Privacygedragscode sector particuliere onderzoeksbureaus van de Nederlandse Veiligheidsbranche. Gorinchem: Nederlandse Veiligheidsbranche.
PwC. (2017). Economic crime survey Nederland 2017. Amsterdam: PricewaterhouseCoopers.
Rense, J. F. (2004). De private onderzoeker; (ver)plicht tot hoor en wederhoor? Maandblad voor Accountancy en Bedrijfseconomie, 78(3), 76–80.
Schaap, C. D. (2008). De private forensisch fraudedeskundige. Een feitelijke en juridische positionering. Nijmegen: Wolf Legal Publishers.
Schimmel, P. (2011). Fraudebeheersing; een leidraad van preventie tot detectie. Deventer: Kluwer.
Thumala, A., Goold, B., & Loader, I. (2011). A tainted trade? Moral ambivalence and legitimation work in the private security industry. The British Journal of Sociology, 62(2), 284–303.
van Almelo, L., & Schimmel, P. (2014). Feiten maken het recht. Een studie van Grant Thornton Forensic & Investigation Services naar een goed forensisch accountantsonderzoek. Rotterdam: Grant Thornton.
van Wijk, J., Huisman, W., Feuth, T., & van de Bunt, H. G. (2002). Op deugdelijke grondslag. Een explorerende studie naar de forensische accountancy. Zeist: Uitgeverij Kerckebosch.
Williams, J. W. (2005). Reflections on the private versus public policing of economic crime. British Journal of Criminology, 45(3), 316–339.
Williams, J. W. (2014). The private eyes of corporate culture: The forensic accounting and corporate investigation industry and the production of corporate financial security. In K. Walby & R. Lippert (Eds.), Corporate security in the 21st century: Theory and practice in international perspective (pp. 56–77). Basingstoke: Palgrave Macmillan.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Meerts, C.A. (2019). Corporate Investigations. In: Corporate Investigations, Corporate Justice and Public-Private Relations. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26516-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-030-26516-8_3
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-26515-1
Online ISBN: 978-3-030-26516-8
eBook Packages: Law and CriminologyLaw and Criminology (R0)