Honest services fraud

Decent Essays
Improved Essays
Superior Essays
Great Essays
Brilliant Essays
    Page 16 of 50 - About 500 Essays
  • Decent Essays

    Ip Theft Case

    • 333 Words
    • 2 Pages

    ICE has become the leading agency surrounding the investigation of IP theft to include those illicit activities associated with that theft such as smuggling and money laundering. Counterfeit products are being targeted and seized on a daily basis entering ports, airports, and other points of entry into the US. The goal of ICE is not limited to targeting and seizure of counterfeit products but is meant to impede the manufacturing, distribution, sales, and financing of those TCOs and other…

    • 333 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Where Companies have gone wrong in the past. Unfortunately being PCI DSS compliant does not always guarantee that your data is secure. There are numerous cases in which data security breaches have had companies in the headlines for reason they wish they weren’t. During this case study report we will discuss two such breaches in detail and outline where the companies went wrong. The first company is Heartland Payment Systems (HPS), this company hit the headlines in January of 2009 when they…

    • 519 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Alecia Swasy Case Summary

    • 404 Words
    • 2 Pages

    call in August 1991 from a former Procter & Gamble manager. He informed her that the police wanted to know what their previous conversations regarding P&G were about. The reason why this was happening because he was being investigated by Cincinnati fraud squad investigator Gary Armstrong. He was a part-time security guard for P&G and happened to have records of recent long-distance conversations, some which included calls with Alecia Swasy (Boatright, 2011, p.50). Swacy had published two…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    contributions. They also eliminated dividends on preferred and common stock leaving the stock outstanding and continued payment on the debt instruments (Oesterle 2011). Finally in 2012, the U.S District Court dismissed the charges against the three Fannie Mae top officials ruling that there was no evidence to suggest that they intended to deceive anyone (Fiderer 2014). Effects and consequences According to Woiceshyn 2011, making an ethical or unethical decision is not a serious issue for…

    • 456 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Financial markets were once male-only clubs, free to create secret agreements with customs and practices yielding products of questionable value. However, a woman named Helane Morrison investigated and exposed the security law violations that cheated investors and endangered the world's economies. According to the Project Eve article, “How Helane Morrison is Shattering the Glass Ceiling in the Corporate World”, her oversight and enforcement actions targeted the fraudulent security sales, market…

    • 328 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Bhatia wrote, “There will be an eventual security crisis amongst one of your properties and the media will leap on it as they always do,” in one of the leaked email. Prosecutors could use this information to charge Avid life executives under Computer Fraud and Abuse Act, which makes it crime for unauthorized trespass. Additionally, both the companies, Nerve.com and Flirt.com could sue for civil…

    • 692 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Threats For College Essay

    • 585 Words
    • 3 Pages

    Aim Higher college could have many threats and vulnerabilities coming its way because just this year there have been extortion hacks, attacks that manipulate data, the zombie botnet and attack on the credit card chip. The most prevalent ones are the credit card chip attack because hackers will be able to sniff the networks and grab the data of the customer when its live sending to the banks as a transaction. Another prevalent threat would be the zombie botnets because the Internet of Things can…

    • 585 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Italy gets back stolen gold cart of Etruscan prince from Denmark A whole host of looted Etruscan treasures, including a Princes' golden carriage will begin arriving back in Italy later this year after spending the last forty years on display at a Danish museum. The priceless artefacts were stolen from the necropolis of in Eretum, the remains of an ancient, pre-Roman city in Lazio and sold to Copenhagen's Ny Carlsberg Glyptotek for 1.2 million Swiss Francs in the 1970s. Since 2008 Italian…

    • 285 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    personal information maintained by an individual or entity as part of a database of personal information regarding multiple individuals and that causes, or the individual or entity reasonably believes has caused, or will cause, identity theft or other fraud to any resident of the Commonwealth.” Personal information is: First initial and last name combined with a social security number, driver’s license information, account numbers, financial information, credit card information, etc. If there…

    • 261 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    to the stamp and decided not to disclose this to him at the time of the sale it constitutes Fraudulent Nondisclosure. In the case that he can’t prove that Stamp Champ knew about this fact, he can try to win the lawsuit for Negligence. A victim of Fraud is entitled to recover the amount of money that he or she lost, any legal fees that had to be pay during the course of the lawsuit, and in some cases…

    • 393 Words
    • 2 Pages
    Decent Essays
  • Page 1 13 14 15 16 17 18 19 20 50