Author - aditya

The role of whistleblowing and digital forensics in exposing data manipulation fraud

In cases of occupational fraud, the perpetrators not only devise intricate schemes to deceive organizations but also employ various techniques to conceal their illicit activities. One such technique is data manipulation. This technique is prevalent in major fraud cases such as Enron, Theranos, Olympus, and a recent case in Indonesia: the...

Read more...

Getting to know the quality and integrity of prospective employees through employment checks

Effective and integrity-driven employee recruitment processes are crucial for the success and continuity of a company. One critical step in this process is conducting an employment check, which is part of a pre-employment background screening. Employment checks involve verifying information related to the candidate's previous position at their former company, the...

Read more...

4 Modes of money laundering vehicles

In May 2018, for the first time, the Corruption Eradication Commission (KPK) established a corporation as a perpetrator of money laundering. KPK named PT Putra Ramadhan or PT Tradha as a corporate suspect. The corporate suspect is a continuation of the investigation of Muhammad Yahya Fuad as the corporate controller who...

Read more...

Here is why candidates falsify their reference letters

Fake document service providers are unceasingly growing in number. Counterfeiting of educational certificates is already something common nowadays, and the practice has developed to include falsifying reference letters (or playing). Counterfeiters are increasingly becoming bold, and they openly advertise these services on social media platforms. Below is a counterfeiter who advertises...

Read more...

Pre-employment screening: Request for consent to release information

Has your company requested the candidates’ consent prior to the pre-employment screening? In Indonesia, the protection of personal data is referred to The Minister of Communication and Information Technology Regulation No. 20 of 2016 concerning The Protection of Personal Data (PPD). PDD regulation is considered to be another challenge for...

Read more...

6 Credential documents that a potential employee can falsify

  The fake diploma is a rampant crime that occurs frequently. One by one, cases are being exposed, although many remain undisclosed. Like a well-established ecosystem, fraudulent diploma transactions continue to emerge. Numerous providers of fake diploma services, commonly known as "diploma mills," have emerged due to high market demand. Buyers of fake...

Read more...

Fabricated health documents and their risks

Diplomas are not the only documents that are often falsified. Forgery of health documents is no less common. Health documents are essentially documents issued by practitioners or health facilities, which include medical certificates and treatment letters, medical receipts, maternity leave letters, medical check-up reports, and so on. Each health document has...

Read more...

3 Ways to prevent conflict of interest from damaging your profits

Conflict of interest is intrinsic to human life and is often the root cause when it comes to fraud cases that involve corruption and bribery. According to Transparency International, a conflict of interest is a complex and sometimes ungraspable concept. Merriam-Webster defines the terminology as a conflict between the private...

Read more...