ACC 692 Module Seven Activity Guidelines and Rubric
Scenario
You are a fraud investigator working for Eagle Eye Fraud Investigations LLC. The firm has been hired by TechJet Inc.’s attorney to assist with investigating a potential fraud scheme at the company. The company has received a tip that senior-level executives have been embezzling funds and fraudulently misstating financial statements. You have been tasked with determining if the information for this engagement is considered privileged communication.
Directions
Using the case study linked in the
Supporting Materials
section, write an email to the senior partner at Eagle Eye Fraud Investigations LLC about what constitutes privileged information in this case study.
Specifically, you must address the following rubric criteria:
- Describe what privileged information is in a fraud investigation.
- Explain the specific factors that must be present for information to be classified as privileged in the context of a fraud investigation
- Conclude whether the information should be considered privileged based on the case study.
- Identify the key factors that would classify the information as privileged or not privileged based on an analysis of the case study.
What to Submit
Submit your email as a 1- to 2-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA style.
Supporting Materials
The following resource supports your work on this assignment:
Resource:
Module Seven Activity Case Study
Read the case study to complete the assignment.
Module Seven Activity Rubric
Criteria | Exemplary ( | 10 | Proficient (90%) | Needs Improvement (70%) | Not Evident (0%) | Value | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Exceeds proficiency in an exceptionally clear, insightful, or sophisticated manner | Describes what is privileged information in a fraud investigation | Shows progress toward proficiency, but with errors or omissions; areas for improvement may include adding details related to describing what is privileged information in a fraud investigation | Does not attempt criterion | 20 | |||||||||
Explains the specific factors that must be present for information to be classified as privileged in the context of a fraud investigation | Shows progress toward proficiency, but with errors or omissions; areas for improvement may include adding details related to explaining the specific factors that must be present for information to be classified as privileged in the context of a fraud investigation | ||||||||||||
Concludes whether the information should be considered privileged based on the case study | Shows progress toward proficiency, but with errors or omissions; areas for improvement may include adding details related to concluding whether the information should be considered privileged based on the case study | ||||||||||||
Identifies the key factors that would classify the information as privileged or not privileged based on an analysis of the case study | Shows progress toward proficiency, but with errors or omissions; areas for improvement may include adding details related to identifying the key factors that would classify the information as privileged or not privileged based on an analysis of the case study | ||||||||||||
Exceeds proficiency with an intentional use of language that promotes a thorough understanding | Consistently and effectively communicates in an organized way to a specific audience | Shows progress towards proficiency, but communication is inconsistent or ineffective in a way that negatively impacts understanding | Shows no evidence of consistent, effective, or organized communication | ||||||||||
Uses citations for ideas requiring attribution, with few or no minor errors | Uses citations for ideas requiring attribution, with consistent minor errors | Uses citations for ideas requiring attribution, with major errors | Does not use citations for ideas requiring attribution | ||||||||||
Total: | 100% |
ACC 692 Module Seven Activity Case Study
The attorney for TechJet Inc., a multinational public-traded corporation, has hired Eagle Eye Fraud
Investigations LLC as a consultant on a fraud investigation. The entire staff at Eagle Eye Fraud
Investigations LLC is intrigued by this fraud investigation, as this is such a high-profile company. The staff
can feel the tension among the team involved in the investigation with the multiple confidential
meetings and whispers throughout the hallways. They were not expecting the investigation to also
include a scandal within the firm.
Recently, a newly minted CFE, Jay Coleman, was hired by Eagle Eye Fraud Investigations LLC and was
part of the team involved in this consulting engagement. Last week, he found documents clearly marked
as confidential on the copier. He ignored the heading that stated, “Priviliged and Confidential.” The
documents included details of the fraud investigation, including key evidence that the team does not
plan to share with other parties in the court case. These documents included evidence implicating the
CEO, CFO, controller, and other members of upper-level management in an embezzlement and financial
statement fraud scheme. Coleman quickly made a copy of the documents so he could read the details
later in his office.
While Coleman should be aware of the potential magnitude of his actions given that he just completed
the CFE exam, he is careless with this information and can’t wait to share it with his friends and
colleagues. He makes them promise to keep this information a secret. It doesn’t take long for this
information to travel throughout the firm. To further complicate matters, the attorney for TechJet Inc.
has requested that the firm serve as an expert witness in the court case. The attorney requested that
the firm provide testimony, including an opinion on the scope of the fraud based on the evidence
Coleman found on the copier. The firm was originally hired as a consultant and still does not plan to
provide this documentation in the discovery process.