Forensics Journal - Stevenson University 2013 | Page 59

STEVENSON UNIVERSITY data. Companies participate in the Safe Harbor Program by providing the Department of Commerce a letter, signed by a corporate officer, which certifies that the company meets the standards of the Safe Harbor Framework (United States Department of Commerce, Self-Certification). Queler, Matthew S., Wendy Wu, and Bettina Chin. “Foreign Corrupt Practices Act: Accounting Provisions.” Proskauer on International Litigation and Arbitration: Managing, Resolving, and Avoiding Cross-Border Business or Regulatory Disputes. Sec. 27.II. Proskauer, 2007. Web. 13 June 2012. http://www.proskauerguide.com/law_topics/27/II CONCLUSION Santangelo, Betty, Gary Stein, and Margaret Jacobs. “The Foreign Corrupt Practices Act: recent cases and enforcement trends.” Journal of Investment Compliance 8.3 (2007): 31-55. Print. As more American corporations enter the global business market it will be necessary for these companies to monitor their conduct on foreign soil, ensure compliance with foreign regulations, and handle data appropriately. It will take a team of sophisticated professionals, including attorneys, IT specialists, Certified Public Accountants, Certified Fraud Examiners, Human Resource Professionals and forensic experts to successfully navigate this compliance minefield. Starr, Craig A., J.D., CFE, and John Warren. Conducting Internal Investigations: Gathering Evidence And Protecting Your Company. The Association of Certified Fraud Examiners, Inc., 2011. Print. United States Department of Commerce. “Introduction.” Export.gov. N.p., 11 Apr. 2012. Web. 13 June 2012. http://export.gov/safeharbor/index.asp. REFERENCES United States Department of Commerce. “Self-Certification.” Export. gov. N.p., 7 May 2012 Web. 13 June 2012. http://export.gov/safeharbor/eu/eg_main_018493.asp. Armstrong, John, Emma Burnett, and Laura Davis. “United Kingdom: Storms Gather For Data Protection In The Cloud.” Mondaq. CMS Cameron McKenna, 19 Aug. 2011. Web. 6 June 2012. http:// www.mondaq.com/x/143080/Data+Protection+Privacy/Storms+Gath er+For+Data+Protection+In+The+Cloud United States Department of Commerce. “U.S.-EU Safe Harbor Framework Documents.” Export.gov. N.p., 7 May 2012. Web. 13 June 2012. http://export.gov/safeharbor/eu/eg_main_018493.asp. Bennett, Steven C. “The Clash Of European Union And United States Data Privacy Laws.” The Metropolitan Corporate Counsel [New York City] Apr. 2008: 46. The Metropolitan Corporate Counsel. Web. 12 June 2012. http://www.metrocorpcounsel.com/articles/9772/ clash-european-union-and-united-states-data-privacy-laws United States Department of Justice. “Antibribery Provisions.” Foreign Corrupt Practices Act. U.S. Department of Justice. n.d. Web. 13 June 2012. http://www.justice.gov/criminal/fraud/fcpa/docs/lay-personsguide.pdf. Biegelman, Martin T., and Daniel R. Biegelman. Foreign Corrupt Practices Act Compliance Guidebook: Protecting Your Organization From Bribery and Corruption. John Wiley & Sons, Inc., 2010. Print. United States. House Judiciary Subcommittee on Crime, Terrorism and Homeland Hearing. “Foreign Corrupt Practices Act. U.S. House of Representatives Documents Congressional Documents Section: U.S. House of Representatives Documents 14 June 2011. Directive 95/46/EC Official Journal L 281, 23/11/1995 P. 00310050. Print KATHY KIRKISH is a Certified Fraud Examiner. As an employee of a federal contractor, she works in Homeland Security Investigations performing financial investigations of drug trade organizations, money laundering schemes, bulk cash smuggling, and intellectual property rights violations. Ms. Kirkish locates assets acquired with criminal proceeds for asset forfeiture purposes. In the past, she conducted civil investigations of financial crimes on behalf of law firms and fidelity carriers. Manning, Walt, CFE, EnCE. “Investigating in the Clouds.” Fraud Magazine. July-Aug. 2011: 19-23. Print. O’Brien, Kevin J. “Cloud Computing Hits Snag in Europe.” The New York Times 19 Sept. 2010: n. pag. The New York Times. Web. 13 J չ