SlideShare une entreprise Scribd logo
1  sur  5
Défis d’un dossier d’enquête
de corruption à l’étranger
Stéphan Drolet, FCPA, CPA, CPA.EJC, EEE, CFF
Associé et Leader National Juricomptabilité KPMG
Et
Milos Barutciski, Associé Sénior Bennett Jones
2
 ÉTUDE D’UN CAS FICTIF
3
LES FAITS RAPPORTÉS
 Société canadienne publique ayant des opérations au Brésil et détenant des
opérations aussi aux États-Unis, dont de l’endettement américain;
 Allégation reçue par un lanceur d’alerte que des employés spécifiques de la
société au Brésil auraient payer des pots-de vins à des représentants
gouvernementaux au Brésil pour obtenir des informations privilégiées et gagner
des contrats importants du gouvernement brésilien. Le tout se serait déroulé sur
une période de 5 ans environ;
 L’information disponible sur ce dossier serait sous format papier et électronique,
incluant des milliers de courriels;
 Les ordinateurs des employés visés sont des portables et appartiennent à la
société;
 Les téléphones cellulaires appartiennent cependant aux employés spécifiques;
 Les bandes de sauvegarde des courriels et des autres documents pertinents se
retrouvent tant au Canada qu’au Brésil;
 Certain des employés visés ou au courant de cette situation ne sont plus à
l’emploi de la société brésilienne.
4
Questions
 Qu’elles sont les expertises
requises pour effectuer une
telle enquête?
 Qu’elles sont les grandes
étapes? Qui les font?
 Qu’elles sont les défis légaux?
 Qu’elles sont les autres défis?
5
Conclusion
 Ce type d’enquête requiert des expertises pointues
(légal, juricomptable, technologique)
 Un travail de collaboration entre les experts de façon
continue
 Chaque expert doit respecter le travail des autres
experts et être ouvert à utiliser de nouvelles approches
si des défis surgissent
 La clé est un plan d’enquête bien développé entre les
experts mais qui doit demeure très flexible en fonction
des obstacles et défis rencontrés

Contenu connexe

En vedette

Whistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruptionWhistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruptionPECB
 
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...PECB
 
ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...PECB
 
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifComprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifPECB
 
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsFCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsPECB
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyPECB
 

En vedette (6)

Whistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruptionWhistleblowers – A key but misunderstood tool in the fight against corruption
Whistleblowers – A key but misunderstood tool in the fight against corruption
 
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
Protecting Against Bribery Risk in Business Transactions: Developing an Effec...
 
ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...ISO Standards support for Anti-Bribery investigations and audits in the cyber...
ISO Standards support for Anti-Bribery investigations and audits in the cyber...
 
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectifComprendre le contexte de la corruption - La façon d’atteindre l’objectif
Comprendre le contexte de la corruption - La façon d’atteindre l’objectif
 
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance ProgramsFCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
FCPA Enforcement Tends and Their Impact on Corporate Compliance Programs
 
Anti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacyAnti-bribery, digital investigation and privacy
Anti-bribery, digital investigation and privacy
 

Plus de PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityPECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernancePECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyPECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationPECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsPECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptxPECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxPECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 

Plus de PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Challenges of Investigating Corruption Abroad

  • 1. Défis d’un dossier d’enquête de corruption à l’étranger Stéphan Drolet, FCPA, CPA, CPA.EJC, EEE, CFF Associé et Leader National Juricomptabilité KPMG Et Milos Barutciski, Associé Sénior Bennett Jones
  • 2. 2  ÉTUDE D’UN CAS FICTIF
  • 3. 3 LES FAITS RAPPORTÉS  Société canadienne publique ayant des opérations au Brésil et détenant des opérations aussi aux États-Unis, dont de l’endettement américain;  Allégation reçue par un lanceur d’alerte que des employés spécifiques de la société au Brésil auraient payer des pots-de vins à des représentants gouvernementaux au Brésil pour obtenir des informations privilégiées et gagner des contrats importants du gouvernement brésilien. Le tout se serait déroulé sur une période de 5 ans environ;  L’information disponible sur ce dossier serait sous format papier et électronique, incluant des milliers de courriels;  Les ordinateurs des employés visés sont des portables et appartiennent à la société;  Les téléphones cellulaires appartiennent cependant aux employés spécifiques;  Les bandes de sauvegarde des courriels et des autres documents pertinents se retrouvent tant au Canada qu’au Brésil;  Certain des employés visés ou au courant de cette situation ne sont plus à l’emploi de la société brésilienne.
  • 4. 4 Questions  Qu’elles sont les expertises requises pour effectuer une telle enquête?  Qu’elles sont les grandes étapes? Qui les font?  Qu’elles sont les défis légaux?  Qu’elles sont les autres défis?
  • 5. 5 Conclusion  Ce type d’enquête requiert des expertises pointues (légal, juricomptable, technologique)  Un travail de collaboration entre les experts de façon continue  Chaque expert doit respecter le travail des autres experts et être ouvert à utiliser de nouvelles approches si des défis surgissent  La clé est un plan d’enquête bien développé entre les experts mais qui doit demeure très flexible en fonction des obstacles et défis rencontrés