Judge Seminar 1: Dealing with Economic and Financial Crimes (Manila)

HRODC Postgraduate Training Institute
En Manila, Philippines (Filipinas)

£ 12.000 - ($ 239.878)
IVA Exento

Información importante

  • Curso
  • Manila, philippines (Filipinas)
  • Duración:
    12 Days
  • Cuándo:
    A definir
Descripción


Suitable for: This course is specifically designed for: Judges. Lawyers. Prosecutors. Politicians. Employees of the legal profession. Law Graduates

Información importante

Requisitos: Degree or Work Experience

Sedes

Dónde se enseña y en qué fechas

inicio Ubicación
A definir
Manila, Philippines
Makati, 1200, Philippines, Filipinas
Ver mapa

¿Qué aprendés en este curso?

IT Law
Access
Security
Information Systems
Internet
IT
Office IT
Ethics
Design
International
Banking
Financial
Law
Public
systems
Ms Office
Communication Training
Financial Training
IT Security

Temario

Course Contents, Concepts and Issues

Econimc and Financial Crimes:

  • Defining Economic and Financial Crimes (EFCs)
  • Public sector corruption: Nigerian and International Perspectives
  • The Enron Case
  • Impact of globalisation and news media in economic and financial crimes
  • Impact of Economic and Financial Crimes on:
  • * Individuals
  • * Institutions
  • * National Economy
  • * Global Economy
  • Financial Crimes and The Judiciary
  • International convention related to Economic & Financial Crimes
  • Terrorists financing
  • Forfeiture of Assets as a preventive and mechanism
  • The Role of the judiciary in combating economic and financial crimes

Financial Crimes and The Judiciary

 

  • International convention related to Economic & Financial Crimes
  • Terrorists Financing
  • Forfeiture of Assets as a Preventive Mechanism
  • The Role of Judiciary in Combating Economic and Financial Crimes
  • Instructing Jury on EFCCs Making Judgements based on PerceivedImpact of Financial and Economic Crimes
  • Overview of the Nigerian Financial Crime Act 2004 and other related legislations

Information Systems Crimes

  • Information Systems Design: An Introduction
  • The Internet and Intranet: Design and Access Factors
  • Intranet and Internet Security: Firewalls and Security Coding Generation and Application
  • Internet Security Breaches: Accidental of Deliberate Breaches
  • Information Systems Crimes
  • Information Analysis
  • Internet Crimes Catalogue
  • Internet Crime: Level of Effort for Would-Be Fraudster
  • Computer Programming: A Basic Overview
  • Computer Viruses: Design, Effect/Counter Viruses

Money Laundering

  • Shell Banks
  • High-Value Retail
  • What is Money Laundering?
  • Financial Action Task Force (FATF)
  • Modelling Global Money Laundering Flows
  • Underground Banking and National Security
  • Money Laundering in Casinos
  • Charting the maze of electronic money transfers
  • Anti-Money Laundering Support Systems
  • International Money Laundering Information Network
  • The British Money Laundering Legislation 1993
  • Statutory Instruments:
  • * Money Laundering Regulation 2001 & 2003
  • * Drug Trafficking Act 1974
  • * Proceeds of Crime Act 1995
  • * The Criminal Justice Act 1998

Anti-Fraud and Regulatory Bodies

  • The Law Society
  • AnCoRR Web
  • Fraud Reduction Website
  • The United nations Convention against Transnational Organised Crimes and its Protocol
  • HM Customs and Excise
  • The Serious Fraud Office
  • UK Treasury Annual Frayd Reports
  • Committee on Standards in Public Life
  • UK Financial Services Authority
  • NCIS Economic Crime Branch
  • Office of the Banking Ombudsman
  • OLAF European Anti-Fraud Office
  • NASD Regulation Inc.
  • Inter-American Convetion against Corruption
  • RespondaNet: The America's Accountability/Anti-Corruption Project
  • Royal Canadian Mounted Police: Frauds and Scams
  • International Bar Association
  • Transparency International
  • World Bank Institute Governance Group
  • World bank Anti-Corruption and Fraud Resources
  • International Money Transfer (Banking Fraud and Smuggling)
  • The Banking System in Nigeria and UK
  • Economic Crimes in Nigeria: Banking Fraud-CBN
  • The Independent Banking Advisory Service
  • British Bankers' Association
  • IBAS
  • Consumer Direct: Scams
  • Court of Auditors of the European Union
  • U.S. Securities and Exchange Commission
  • U.S. Financial Crimes Enforcement Network (FinCEN)
  • Internat Fraud Complaint Centre
  • Australia Scam Watch
  • Public Sector Corruption

 

Information Management & Communication

  • Distinguish between Data and Information
  • Communication Barriers and Circumvention
  • Communication and Risk Management
  • Information Disemination
  • Eyewitness Unreliability
  • Information Security and Case Confidentiality
  • Information Release: Secret Documents and Archiving
  • Kenetics vs. Kinesiology: Their Impact on Evidence Presented

Ethics In Judgement

  • Ethical Headline Cases
  • Ethics and Ethical Behaviour
  • Ethics and Morality
  • Ethical Dilemma
  • Ethics: A Historical Perspective
  • Ethics In Judgement
  • Ethical Judgments
  • Ethics and Secularity
  • Ethics and Religions Norms
  • Ethics and Corporate Responsibility
  • Ethical Decision Making

Understanding and Deterring Cybercrime Part 1

  • Incidence and implications of ‘theft of service’ (including telecom) fraud
  • Trade secret theft as a cybercrime
  • Understanding malicious code
  • Recognising and averting spamming
  • Cyberstalking as a crime: Exploring volunerabilities and remedies
  • What is involved in ‘denial-of-service’ attacks
  • Dealing with copyright violation
  • Understanding and Dealing with securities fraud

Understanding and Dettering Cybercrimes Part 2

  • Trojans and Industrial Espionage
  • Nigerian '4-1-9 Scheme' or 'Advance Fee Scheme': profiling Victim and Fraudsters
  • Pornographic Grading
  • Detecting and Remedying Child Pornography
  • 'Peer Netrowk' Crimes: The Role of ISPs
  • Authorised Online Access: Access Control Measures
  • Child Pornography and On-line Grooming: Incidence and Aversion
  • Child Pornography and Chatroom Monitoring: Technology Available
  • Identifying Theft through Hacking and Phishing