Skip to main content

Corporate Investigations

  • Chapter
  • First Online:
Corporate Investigations, Corporate Justice and Public-Private Relations

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 284 Accesses

Abstract

In this chapter, the day-to-day activities of corporate investigators are discussed. What are the investigative methods that are used by corporate investigators and how does the investigative process take shape? In this chapter, interview data, case study material and observation data are used to unravel the daily activities of corporate investigators. As becomes apparent, corporate investigators provide a comprehensive service. The investigations may, in this way, stay fully in the private legal sphere, without any criminal justice involvement. Within this private legal sphere, corporate investigators can move with considerable autonomy, providing a specialised and custom-made service to clients. Reasons for the popularity of corporate investigations are discussed in this chapter, as well as the full investigative process and corporate investigators’ relationship with their client.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See, for example, the report of KRO Brandpunt, Bespied door de baas (1 June 2014) as an example of the public image of corporate investigations. Available on http://brandpunt.kro.nl/seizoenen/2014/afleveringen/01-06-2014.

  2. 2.

    See articles 141 and 142 of the Dutch Code of Criminal Procedure (Wetboek van Strafvordering—WvSv). Article 141 charges the prosecution, police officers, military police and special investigative agencies of the ministries with the investigation of criminal offences. Article 142 states that the Minister of Justice and security may define additional persons as ‘special investigating officer’.

  3. 3.

    Because the employee might not grant access willingly, this is sometimes contested in court as improper. However, case law supports the legality of the use of corporate investigation methods (see, e.g., ECLI:NL:RBAMS:2016:8313, in which the defendant claimed that the private investigations were illegal. The (criminal) court dismissed this argument).

  4. 4.

    This research also avoids ‘criminal law terminology’, as the use of these terms would be incorrect in the context of corporate investigations. An involved person for example is not a suspect in the sense of a criminal procedure (and as such does not enjoy the same rights). The adversarial principle could be interpreted as being a criminal justice term (as it is a leading principle of law in criminal proceedings); however, in the Dutch legal system, this is a term that is used in all legal proceedings, from administrative to civil to criminal, and it is thus not specifically linked to the criminal justice system.

  5. 5.

    See the previous Chapter 2 for a general overview of legal frameworks applicable to the different professional groups of investigators.

  6. 6.

    As distinct from broader investigations into the organisation, not focusing on an individual but on an issue.

  7. 7.

    Although this circumstance alone is not sufficient proof, as people tend to use each other’s key cards even when this is prohibited by the internal code of the organisation.

  8. 8.

    This does not necessarily mean that the blacklist does not comply. Many larger organisations have a privacy officer who is better informed on these issues than the respondents mentioned here.

  9. 9.

    For more information, see Chapter 2 of this book.

  10. 10.

    These are not necessarily corporate investigators. Training programmes are often provided by digital specialists.

  11. 11.

    See Chapter 5 for more on public-private relations and information sharing.

  12. 12.

    This is based on the former Privacy law (see articles 33, 34 and 43 WBP). Revisions have been made to the privacy code of conduct as a result of the new EU-wide privacy regulation. These revisions are currently under consideration by the Data Protection Authority. In the meantime, the privacy code of conduct ‘should be read in accordance with the GDPR’ (Autoriteit Persoonsgegevens, n.d.-c).

  13. 13.

    There are many (mostly USA) textbooks, e-learnings and other professional information available on different approaches and interview techniques (and on corporate investigations more generally; see, e.g., Brian, McNeil, & Demsky, 2017). In this section, the broader outlines of the interview as a source of information are described—the aforementioned very detailed instructions on how to interview are beyond the scope of this chapter. Additionally, the fieldwork reveals that many corporate investigators feel that interviewing can be taught but much importance is given to experience and following one’s own instincts. Although respondents state that there are no standard ways to interview, stressing the importance of flexibility, they seem to broadly follow the process as delineated in this section.

  14. 14.

    Unsurprisingly, an investigative interview follows some of the same basic rules followed by social scientists when interviewing respondents (Baarda, de Goede, & van der Meer-Middelburg, 1996).

  15. 15.

    This research has found no evidence of corporate investigators abusing their power by mistreating the interviewee. This does not mean, however, that such a situation never occurs.

  16. 16.

    Interestingly, in this sense the corporate investigations process follows civil law logic, rather than the logic of criminal investigations. In the civil law system, something is considered a fact when it is presented and not contested by either party (see also Chapter 4 of this book).

  17. 17.

    Not every investigation yields enough information to answer the questions asked in the assignment. When this is the case, a report is made about the findings and the lack of certainty is stated.

  18. 18.

    For example, because other norm violations are discovered within the organisation during the investigations that warrant their own separate investigations (often referred to as ‘by-catch’) or because business partners of the organisation want to have internal investigations as well to ensure they had nothing to do with the norm violation.

  19. 19.

    There are some standards provided for forensic accountants , but not all corporate investigators use them.

  20. 20.

    As we have seen in Chapter 2, investigative costs are also important for in-house departments; however, they are usually justified in more general terms (e.g. in a yearly report, calculated over a whole year) and not in every investigation.

  21. 21.

    See, for example, a 2012 report by Grant Thornton for the municipality of Eindhoven (https://eindhoven.raadsinformatie.nl/document/184307/1/Bijlage_5_Grant_Thornton_eindrapport_TA), a 2015 report by Hoffmann for the municipality of Urk (http://www.omroepflevoland.nl/SiteFiles/Doc/Rapport_onderzoek_naar_lek_E48A8C53F9EC9A01C1257DE400371DDF.pdf), a 2012 report by Deloitte for Avalex (http://www.politiekdelft.nl/avalex_rapport_deloitte_20120330.pdf) or (in a more limited way) the 2015 report of De Brauw for NS (https://zoek.officielebekendmakingen.nl/blg-614489.pdf).

  22. 22.

    Neither can the police of course, although law enforcement authorities do have the power to summon documents, enter buildings without consent (when this is approved by a prosecutor or judge), or use other more or less coercive measures.

References

  • Autoriteit Persoonsgegevens. (n.d.-a). Welke voorwaarden gelden voor de controle van werknemers? Retrieved from https://www.autoriteitpersoonsgegevens.nl/nl/onderwerpen/werk-uitkering/controle-van-personeel.

  • Autoriteit Persoonsgegevens. (n.d.-b). Cameratoezicht op de werkplek. Retrieved from https://autoriteitpersoonsgegevens.nl/nl/onderwerpen/cameratoezicht/cameratoezicht-op-de-werkplek.

  • Autoriteit Persoonsgegevens. (n.d.-c). Gedragscode en AVG. Retrieved from https://autoriteitpersoonsgegevens.nl/nl/onderwerpen/politie-en-justitie/particuliere-recherche.

  • Autoriteit Persoonsgegevens. (n.d.-d). Zwarte lijst. Retrieved from https://autoriteitpersoonsgegevens.nl/nl/zelf-doen/zwarte-lijst.

  • Autoriteit Persoonsgegevens. (2018). AVG-handleiding protocol zwarte lijst. Retrieved from https://autoriteitpersoonsgegevens.nl/sites/default/files/atoms/files/avg-handleiding_protocol_zwarte_lijst.pdf.

  • Baarda, D. B., de Goede, M. P. M., & van der Meer-Middelburg, A. G. E. (1996). Basisboek Open interviewen. Praktische handleiding voor het voorbereiden en afnemen van open interviews. Groningen: Stenfert Kroese.

    Google Scholar 

  • Balter, R., & Bellissard, L. (2003). A ScalAgent Distributed Technologies white paper: Scalable and flexible mediation infrastructure for networked smart devices. Échirolles: ScalAgent Distributed Technologies.

    Google Scholar 

  • Brian, B. D., McNeil, B. F., & Demsky, L. (2017). Internal corporate investigations (4th ed.). Chicago: ABA Book Publishing.

    Google Scholar 

  • Coburn, N. F. (2006). Corporate investigations. Journal of Financial Crime, 13(3), 348–368.

    Article  Google Scholar 

  • Dorn, N., & Meerts, C. (2009). Corporate security and private settlement: An informal economy of justice. In J. Shapland & P. Ponsaers (Eds.), The informal economy and connections with organised crime: The impact of national social and economic policies (pp. 113–129). Amsterdam: Boom Publishers.

    Google Scholar 

  • Falk Moore, S. (1973). Law and social change: The semi-autonomous social field as an appropriate subject of study. Law & Society Review, 7(4), 719–746.

    Article  Google Scholar 

  • Gill, M. (2013). Engaging the corporate sector in policing: Realities and opportunities. Policing, 7(3), 273–279.

    Article  Google Scholar 

  • Gill, M., & Hart, J. (1997). Exploring investigative policing: A study of private detectives in Britain. British Journal of Criminology, 37(4), 549–576.

    Article  Google Scholar 

  • Grant Thornton. (2010). Grant Thornton Forensic & Investigation Services B.V. Reglement onderzoekswerkzaamheden. Rotterdam: Grant Thornton.

    Google Scholar 

  • Loader, I., & White, A. (2017). How can we better align private security with the public interest? Towards a civilizing model of regulation. Regulation & Governance, 11(2), 166–174.

    Article  Google Scholar 

  • Meerts, C. A. (2013). Corporate security: Private justice? (Un)settling employer-employee troubles. Security Journal, 26(3), 264–279.

    Article  Google Scholar 

  • Meerts, C. A. (2014a). Over pragmatisme en strategie. Tijdschrift voor Criminologie, 56(4), 115–137.

    Google Scholar 

  • Meerts, C. A. (2014b). Corporate security: Governing through private and public law. In K. Walby & R. Lippert (Eds.), Corporate security in the 21st century: Theory and practice in international perspective (pp. 97–115). Basingstoke: Palgrave Macmillan.

    Google Scholar 

  • NIVRA/NOvAA. (2010). NBA-handreiking 1112. Praktijkhandleiding persoonsgerichte onderzoeken voor accountants-administratieconsulenten/registeraccountants. Amsterdam: Koninklijke Nederlandse Beroepsorganisatie voor Accountants.

    Google Scholar 

  • NVb. (2015). Privacygedragscode sector particuliere onderzoeksbureaus van de Nederlandse Veiligheidsbranche. Gorinchem: Nederlandse Veiligheidsbranche.

    Google Scholar 

  • PwC. (2017). Economic crime survey Nederland 2017. Amsterdam: PricewaterhouseCoopers.

    Google Scholar 

  • Rense, J. F. (2004). De private onderzoeker; (ver)plicht tot hoor en wederhoor? Maandblad voor Accountancy en Bedrijfseconomie, 78(3), 76–80.

    Google Scholar 

  • Schaap, C. D. (2008). De private forensisch fraudedeskundige. Een feitelijke en juridische positionering. Nijmegen: Wolf Legal Publishers.

    Google Scholar 

  • Schimmel, P. (2011). Fraudebeheersing; een leidraad van preventie tot detectie. Deventer: Kluwer.

    Google Scholar 

  • Thumala, A., Goold, B., & Loader, I. (2011). A tainted trade? Moral ambivalence and legitimation work in the private security industry. The British Journal of Sociology, 62(2), 284–303.

    Article  Google Scholar 

  • van Almelo, L., & Schimmel, P. (2014). Feiten maken het recht. Een studie van Grant Thornton Forensic & Investigation Services naar een goed forensisch accountantsonderzoek. Rotterdam: Grant Thornton.

    Google Scholar 

  • van Wijk, J., Huisman, W., Feuth, T., & van de Bunt, H. G. (2002). Op deugdelijke grondslag. Een explorerende studie naar de forensische accountancy. Zeist: Uitgeverij Kerckebosch.

    Google Scholar 

  • Williams, J. W. (2005). Reflections on the private versus public policing of economic crime. British Journal of Criminology, 45(3), 316–339.

    Article  Google Scholar 

  • Williams, J. W. (2014). The private eyes of corporate culture: The forensic accounting and corporate investigation industry and the production of corporate financial security. In K. Walby & R. Lippert (Eds.), Corporate security in the 21st century: Theory and practice in international perspective (pp. 56–77). Basingstoke: Palgrave Macmillan.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Clarissa A. Meerts .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Meerts, C.A. (2019). Corporate Investigations. In: Corporate Investigations, Corporate Justice and Public-Private Relations. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-26516-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-26516-8_3

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-26515-1

  • Online ISBN: 978-3-030-26516-8

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics