Document Management A plan for managing all aspects of the documentary evidence uncovered in the investigation must be developed as early as possible. This is particularly true if the suspected wrongdoing involves a complex trail of financial transactions. In most cases, establishing a document management plan will be one of the first steps in the investigation. That way the members of the investigative team will be able to decide which documents will best achieve the strategic goals of the investigation. Any document management plan should provide for the following: Document Security A key priority in document management is to preserve the integrity of all evidence. Most fraud evidence is in the form of working papers, correspondence, and original documents, such as bank statements, checks, customer records, accounting documents like inventory records and ledgers, corporate taxation returns, and computer information. Original documents should be secured as soon as they are seized and stored in locked cabinets or safes accessible only to members of the investigating team. If several keys to these cabinets or safes are in circulation, the locks must be changed. Documents are likely targets for destruction by arson or theft and, therefore, may need to be stored off-site. The documents can also be copied and inventoried, which will also aid in the identification of any documents that have not yet been obtained. The search for additional evidence will be an ongoing task, so an up-to-date inventory of all seized documents is a great help. To help maintain a high level of confidentiality, all working notes and correspondence generated by the investigating team should also be kept in a secure place. Doing everything possible to keep the investigation confidential is important because it helps to protect the reputation of the suspected person. In addition, confidentiality helps ensure that the investigation proceeds unhindered and allows counsel to develop a strategy for any anticipated legal action. Any information about the investigation that is generated or stored on a computer should also be safe-guarded. There's no point in locking physical documents in a cabinet each evening if the investigators' computers holding information about the investigation remain accessible to everyone in the office. It's a good idea to use password protection for all of the investigators' computer files related to the investigation. Using a personal computer that can be locked away each night is an even better solution. A regular back-up of all investigation files should be made and stored in a separate secure location. In addition to securing computerized information about the investigation generated by the investigators, computer evidence linking the suspect to the crime must also be safeguarded. Computer records are often crucial to the successful completion of an investigation, and the first step to securing such records is to make absolutely certain that the suspected person does not retain access to computer information. This would involve changing the passwords on all relevant files, including network files and modem facilities. Care should be taken, however, to guard against any action that might cause undue damage to the suspected individual's reputation. In most companies, regular employees will need to retain daily access to the information contained in the organization's computer system. So that the information necessary to the investigation will remain unaltered and available to the investigators, a back-up of all relevant computer systems should be made, and a duplicate copy of the back-up should be stored with the original documents. Continuity of Evidence It's always a good idea to assume that any document related to the case will be used in court. To be admissible, the document must be genuine and in the same condition it was in when seized. The site from which each document was seized should be recorded, and no marking, stapling, or hole-punching of the original documents should occur. In addition, a clear chain of custody for each document must be demonstrated. All original documents must be uniquely identified, copied, inventoried, and stored in a secure place. If an important document lies around in somebody's in-tray for several days, its authenticity may be challenged. Destruction of Obsolete Documents It might seem obvious, but all discarded or otherwise obsolete documents related to the investigation should be destroyed by shredding. They should never be simply dropped in a wastepaper basket. It can be painfully embarrassing to see the details of a confidential memo or report splashed across the front page of the local newspaper. This kind of carelessness can also lose cases, provoke lawsuits, and end careers. Document Database A simple investigation can often involve hundreds of documents. In more complex cases, investigators may be working with several thousand pieces of evidence. The key in all cases is to file each document in an organized way so that information can be readily located as needed. A manual document management system might serve the purpose in a small investigation; however, a computerized database system is usually more efficient and effective. The system should be selected based on the anticipated number of documents, the interrelationship of the various documents, and the complexity of the investigation. The benefits of any document management database should obviously be weighed against the costs, which will include database development, data input, and ongoing database maintenance. To help make a final choice, the search, retrieval and display, and database access requirements will need to be determined in advance. Another option worth considering is transferring entire documents into machine-readable form using document imaging. Setting Up the Database The first step in setting up a document database is to identify the types of documents involved, the key documents, and any generic document terms that can be used to standardize referencing. Next, a general index of the documents should be created. For smaller investigations, a flat file database, such as a spreadsheet, might be used to list all relevant documents and where they are filed. However, more complex investigations involving large numbers of transactions, funds tracing, or the identification of relationships between companies or individuals will most likely require the use of a relational database, which can create links between two or more pieces of information. The Chronological Database One useful relational database is the chronological database, which is particularly valuable at the start of an investigation when it's hard to determine which documents will be relevant. A basic chronological database will help the investigating team compile a timeline of events, people, companies, and places associated with the alleged wrongdoing. By sorting the recorded information so that the date and time of movements of funds can be identified, a sophisticated chronological database can even help investigators establish links between transactions in different locations and currencies. Final Reports The final aspect of document management is compiling everything in some type of report. Investigators must communicate their findings so that a reader or listener will understand the information and how the investigators reached each conclusion. Not every investigation calls for a formal final report, however. Sometimes an affidavit, an oral report, or a reporting letter will do the job. Regardless of the actual format, any time litigation is anticipated the report should be reviewed by legal counsel to ensure that it is appropriate for court presentation. In cases that involve the presentation of many documents at a trial, legal counsel should be consulted to help investigators prepare a document brief for the convenience of the court. This should contain unmarked copies of all the original documents that may be presented as exhibits. It's not an exhibit itself, but a document brief can save valuable time when the judge and jury need to refer to various original documents during the trial. Final Precautions Although investigation preparation and document management are essential strategies in fraud investigations, the internal auditor must be aware of other actions that can help to achieve an effective inquiry. For example, maintaining good communication among all members of the investigating team will be critical. During an investigation, no investigator ever wants to get into a situation where he or she is working in the dark. Ideally, the investigator in charge of evidence collection should participate in all meetings related to the assignment. When the president meets with the security officer or the general counsel meets with another member of the team without the investigator's knowledge, for example, problems can occur. Such communication breakdowns can sometimes cause the entire investigation to drift off strategy.