Security and loss prevention

Assignment Help Business Management
Reference no: EM1361485

Security and Loss Prevention

You have completed your investigation on allegations against a plant employee of an acquired corporation, Lakes Inc. that is based on the basic information given below. Create a report on the results of your investigation and present final results that your investigation has concluded.

The following are the main points of the investigation, including what took place and the findings of the investigation:

Facts:
1. You conducted an investigation at the plant of Lakes, Inc. based on an anonymous tip that the company received on June 12, 2007 that an employee was submitting false expense claims.

2. The tip stated that an invoice for the purchase of a computer server was false and that the actual purchase was for a high definition (HD) flat screen television.

3. The company requested that you perform the investigation.

4. The investigation took place from August to November 2009.

5. The investigation determined that $8,795.60 in false invoices had been submitted for reimbursement through the purchasing department.

6. The associate director of purchasing and his administrative assistant were terminated.

7. The investigation determined that there was no original invoice on file but only a copy. The purchase was made with a corporate purchased card issued to Mr. Bob Smith, the Associate Director of Purchasing.

8. The vendor, Sterns, was contacted and confirmed that the invoice number on the file copy matched on the invoice they had for the sale of a HD television.

9. Lakes, Inc. maintains a physical asset database in which all nondisposable items with a purchase price of $1,000 or more are recorded. Each item is assigned a unique ID number and barcode label, which are used to track the item. The database is maintained by the administrative assistant.

10. There was no record of the computer server in the physical assets database, and no ID number had been issued for any similar item in the past 10 months.

11. An on-site visit was made to Sterns, an approved vendor since May 2005.

12. The manager, Mr. Ted Jones, advised that in the past 6 months the same individual, Mr. Bob Smith, had made 2 other purchases that he considered odd because he asked that the purchase be held for pick up by either him or his administrative assistant, Ms. Mary Bad.

13. Mr. Jones also noted that Ms. Bad had used Mr. Smith's purchase card to make an additional 3 purchases with the same request that they be held for pick up.

14. Mr. Jones provided copies of the invoices that showed the purchase of a notebook computer, a digital camera, a digital camcorder, a GPS system, and a home theater system.

15. When these invoices were compared with the plant purchasing records it was found that the files contained only copies as opposed to originals. Each of the file copies matched an original invoice as to the invoice number, date, and amount but were different as to what was purchased. All other purchases were made with the same purchase card and approved by Mr. Smith.

Reference no: EM1361485

Questions Cloud

Calculate the magnitude of the systems acceleration : What is the (a) magnitude and (b) angle (measured relative to the positive direction of the x axis) of the asteroid's acceleration.
Statistics on diabetes : What statistic surprised you when you visited the ADA Web site? Copy and paste the statistic at the beginning of your response and be sure to cite this information correctly.
Operations management - productivity ratios : Calculate the productivity ratios AND the percentage change in productivity for each from 2010 to 2011.
Semi strong form of efficient market hypothesis : How would I find the investor's profit on a short sale at $45 if covered at a price of $30 and determine the semi-strong form of the efficient market hypothesis?
Security and loss prevention : You conducted an investigation at the plant of Lakes, Inc. based on an anonymous tip that the company received on June 12, 2007 that an employee was submitting false expense claims.
How to collect data for traffic analysis : Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?
Communicable disease chain : How can communicable diseases be broken at a link within the communicable disease chain? Are there steps that a nurse can take to facilitate this process? Give a specific example.
Elucidate how trash bag is strongest such bag on the market : Explain how convinced are you that the new 30-gallon trash bag is the strongest such bag on the market.
Write java program to receive input and displayed interest : Write a Java program that receive some input and displayed the interest. Format the number into 2 decimal places. Using loop is an advantage.

Reviews

Write a Review

Business Management Questions & Answers

  Question about organizational theory

Explain the differences between centralization and decentralization and between standardization and mutual adjustment and what factors determine the ability to strike a balance between these mechanisms?

  Explain about about team and leadership

Important information about Team and Leadership - What do you think will be the key cultural or organizational legacy this leader will leave behind?

  Social responsibilities of pharmaceutical companies

What social responsibilities do pharmaceutical companies have that differs from other types of companies? Who are the primary stakeholders a pharmaceutical company has and how do you think they are prioritized?

  Explain jeff is a salesperson for a building materials

Explain Jeff is a salesperson for a building materials company and has been calling unsuccessfully on LaTasha for several weeks

  Development, and performance analysis

Explain how you would use performance analysis to identify what, if any, are Santos's training needs.

  Chinese imports and food safety video

After viewing Chinese Imports & Food Safety Video, consider whether U.S. retailers that utilize products or raw ingredients that are imported from China and that are poorly regulated should be liable in tort for injuries to consumers who are harme..

  What does this say about leadership and leadership training

A lot of new managers error in selecting the right leadership style when they move into management and why do you think this happens

  Development of netflix strategic plans

What role will Redbox and other competitors play in the development of Netflix's strategic plans? How threatening are these competitors to Netflix's future?

  Explain matthew is planning to open a manufacturing facility

Explain Matthew is planning to open a manufacturing facility and He is considering a Christian-only hiring policy whereby he would determine to hire only professing

  Regulate the psychology of consumer decision-making

Regulate the psychology of consumer decision-making, Evaluate when social factors impact consumer decisions, Regulate the five factors that influence decision by consumers

  Strategy to set up an import function

Imagine you own a small computer hardware company. From the e-Activity, design an overall strategy to set up an import function in your company. Determine the two essential elements your plan must have and why you selected these two.

  Show high possibility of organizational silence

Consider the issue of organizational silence. What factors in an organization would lead to a high possibility of organizational silence? What techniques would be useful in reducing the possible negative effects of organizational silence?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd