If you have trouble viewing this message, please click here.

ARXIS - Litigation Consulting
ABOUT ARXIS                          SERVICES                          CONTACT

December 2020

 
Recent Case:

Embezzlement: What the Auditors Could Not Find!

embezzlement

Type of Matter:
The Board of Directors and senior management of a large company with several divisions began to suspect that a division controller was embezzling significant amounts of cash. They initially brought in the outside auditors to review bank reconciliations and other reporting for the division. The company spent material amounts of money for up to 6 staff members from the outside audit firm reviewing bank reconciliations for over a week. The Board members began to get uncomfortable with the results of that review and decided they needed a focused fraud examination and called Arxis Financial.

Arxis Work:
At the initial meeting with Arxis Financial, the bank reconciliations were specifically excluded from the work scope approved for Arxis. While this was understandable due to the enormous cost of reviewing them already, it became a point of significant contention. Ultimately, we refused to take the engagement unless we were allowed to review the bank reconciliations - essentially covering the same territory as the outside audit firm. Either the reconciliations accurately reflected the activity in the accounts or they were being fabricated to hide illicit activity. Either way, it was the logical starting point.

Once we were authorized to review the bank reconciliations we began work. On the first day it was determined that the reconciliations were indeed problematic. What became apparent very quickly was that the beginning cash balance on any given reconciliation did not agree with the prior month's ending cash balance. The client was relieved that it did not require a week of Arxis Financial's time to evaluate the reconciliations.

Once we had proof that there were anomalies in the accounting for cash, further investigation was initiated to determine if the discrepancies were the result of human/software error or the result of intentional manipulation and misrepresentation.

Result:
We found that material and significant misappropriation of company assets had taken place over an extended period of time. As a result of our fraud investigation, the Controller was terminated, arrested, subsequently convicted, and is serving time in state prison. The method of hiding the embezzlement was so simple that apparently 6 auditors didn't think to check it, which although disappointing to the company, is a key reason why a professional fraud investigation team should be engaged to investigate such suspicions.

We provided several recommendations for company management in order to minimize the chances of future embezzlement. The company was greatly pleased with Arxis Financial's expertise, expediency, successful investigation and recommendations.

 
Service Profile:

Forensic Accounting Services for Trade Secret Theft

trade secret theft

Trade secrets are defined under the law in varying ways depending on the legal jurisdiction. There are three factors that tend to cut across all definitions: it is information that is generally not known that confers economic benefit on its holder, and is the subject of reasonable efforts to maintain its secrecy. The value of the secret derives specifically from the fact that it is not known, not just from the value of the information itself. If a company takes no steps to protect the information there is a weakened ability to claim trade secret status.

Businesses generally protect secrets through the use of non-compete and non-disclosure contracts with vendors, customers, employees, and others who have access to the information. This places the theft of secrets into a framework of violating a written agreement in addition to the actual misappropriation and misuse of the information. Once a company suspects that its secrets have been stolen there must be an effort to identify not only who took the secrets, but how they are being used. This generally requires an extraordinary effort to obtain (often, secret) communications, data download histories, relationship clues, and interviews/cooperation from individuals (recipients of the secrets) who are not motivated to assist in the investigation.

The most common case of trade secret theft is when an employee resigns or is terminated. It is common in trade secret cases to discover that the departing employee was recruited by a competitor business and offered employment and compensation for changing employment and bringing secrets with them. Resolving these cases is often dependent on sophisticated data tracking systems that retain emails and date/time stamped records of data dumps from servers and hard drives.

Once the case has been made that secrets were stolen the decision is made whether to pursue criminal prosecution, civil remedies, or both. The criminal penalties are severe and can include jail time for the persons involved. Under federal law, companies involved in theft of trade secrets can be fined the greater of $10,000,000 or three times the value of the stolen trade secret.

Civil litigation can result in a range of penalties including injunctions, a reallocation of profit earned from the secret by the party who benefitted from the theft, reimbursement of actual damages, and punitive damages. In some jurisdictions, the award can include a multiple of actual damages. Actual damages can be calculated as lost profits or by placing a value on the information that was stolen. To the extent the information was stolen and destroyed (published widely, for example) the extent of damage was the value of the information right before it was destroyed.

Valuation of intellectual property, including trade secrets, is ultimately based on the projected income stream generated by the information discounted to present value at an appropriate risk rate. The valuation of trade secrets is difficult because of the need to isolate the historical income stream associated uniquely with the information that was protected as secret. The valuation expert must be able to identify income, direct expenses, and allocated indirect expenses associated with the information. That data is then used to project future net cash flows. In some cases where the information is stolen, used by a competitor, and cannot be recovered the value of damages is calculated based on the marginal benefit derived by the competitor from the stolen information.

As noted above, accurate and relevant estimates of damages are based on reliable historical accounting information. Additionally, the use of an experienced account and valuation expert is required to properly use the historical information as a basis to opine as to the value of the trade secret and/or the damages caused by the theft of the trade secrets.

The Forensic Accounting practice is headed by partner Chris L. Hamilton, CPA, CFE, CVA. Mr. Hamilton is a Certified Public Accountant, Certified Fraud Examiner, and Certified Valuation Analyst. He is a licensed life and disability insurance agent and a General Securities Representative. Mr. Hamilton has published articles in several publications, and has made presentations at national conferences, training institutes and seminars on topics including forensic accounting, fraud and business appraisal.

 
 
Arxis Financial respects your time and privacy. If you no longer want to receive e-mails such as this one, please click here.
Note: Please do not respond to this E-Mail. The reply to E-Mail address is not a monitored account.

 
Chris Hamilton, CPA, CFE, CVA
 
 
Chris Hamilton, CPA, CFE, CVA
chamilton@arxisfinancial.com
(805) 342-0749
www.arxisfinancial.com
 
Twitter Linkedin
 
 
ARXIS Financial Unsubscribe
 
Disclaimer
 
Copyright Arxis Financial.
All rights reserved.
 
Clients know us for results. Opposing counsel know Arxis for wishing they had hired us.