{"id":4244,"date":"2025-12-02T19:43:38","date_gmt":"2025-12-02T19:43:38","guid":{"rendered":"https:\/\/prosecure.com.tr\/fraud-investigation\/"},"modified":"2026-04-03T10:25:00","modified_gmt":"2026-04-03T10:25:00","slug":"fraud-investigation","status":"publish","type":"page","link":"https:\/\/prosecure.com.tr\/en\/fraud-investigation\/","title":{"rendered":"Fraud Investigation, Prevention, and Compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4244\" class=\"elementor elementor-4244 elementor-689\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-36fed08 e-con-full hero-pre e-flex e-con e-parent\" data-id=\"36fed08\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d71c440 e-flex e-con-boxed e-con e-child\" data-id=\"d71c440\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3654346 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3654346\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">We address employee misconduct cases with the dimensions of perpetrator, method, damage and organizational vulnerability, and provide evidence-based reports suitable for administrative and judicial proceedings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a8d7f31 e-flex e-con-boxed e-con e-parent\" data-id=\"a8d7f31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dc7f5e elementor-widget elementor-widget-spacer\" data-id=\"0dc7f5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-93098d9 e-flex e-con-boxed e-con e-parent\" data-id=\"93098d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a947533 e-con-full hero-divider e-flex e-con e-child\" data-id=\"a947533\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9085beb elementor-widget elementor-widget-heading\" data-id=\"9085beb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Fraud Investigation?\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acc3d5a elementor-widget-mobile__width-inherit elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"acc3d5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\"><strong>Fraud investigation<\/strong> is an evidence-based response to an unexpected suspicion; its purpose is to determine how the violation occurred, by whom, and from which system vulnerability it originated. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00b36fb elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"00b36fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Fraud investigation is an independent investigation that investigates allegations of unfair gain through abuse of trust and authority in companies. Its purpose is to eliminate weaknesses in the internal control mechanism, prevent financial losses and protect the reputation of the organization. A holistic investigation of data, documents and employee statements by independent experts is critical.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d95bef8 e-flex e-con-boxed e-con e-parent\" data-id=\"d95bef8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-51ea73f e-con-full hero-divider e-flex e-con e-child\" data-id=\"51ea73f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b1cddc elementor-widget elementor-widget-heading\" data-id=\"9b1cddc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Fraud Investigation and Prevention is Critical for Companies?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-580a5df elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"580a5df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"fraud-hero-text\"><p class=\"fh-line fh-risk\"><strong>According to ACFE (Association of Certified Fraud Examiners) data; <br>Companies lose at least 5% of their turnover every year due to employee misconduct, i.e. fraud cases.<\/strong> The loss is not only financial, but fair competition, corporate sustainability<span class=\"fh-highlight\"> and reputation<\/span> are also severely damaged. <strong>At least one in every 20 organizations<\/strong> is currently engaged in active misconduct!<\/p><p>In today&#8217;s world of economic uncertainty and sociocultural decay, employee misconduct is more prevalent than ever before and continues to cost companies exponentially.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0fbae3b kt-clr e-flex e-con-boxed e-con e-parent\" data-id=\"0fbae3b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d35ba07 e-con-full hero-divider e-flex e-con e-child\" data-id=\"d35ba07\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e44e8a elementor-widget elementor-widget-heading\" data-id=\"8e44e8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">To what extent does your organization allow for fraud?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18382f3 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"18382f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"592\" data-end=\"929\">The question is not only <strong data-start=\"611\" data-end=\"642\">&#8220;is there misconduct in the organization?&#8221;<\/strong>; <strong data-start=\"653\" data-end=\"706\">the extent to which the organizational structure is open to misconduct<\/strong> is at least as critical as the previous question. This is because internal misconduct cases are often the result of corporate governance weaknesses, organizational culture, internal control and audit deficiencies, rather than a personal employee error. <\/p><p data-start=\"931\" data-end=\"1161\">For this reason, Prosecure&#8217;s fraud investigations are not limited to focusing on the perpetrator and the case at hand; we also <strong data-start=\"1043\" data-end=\"1097\">aim to expose potential risk areas<\/strong> and identify systemic weaknesses.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c33dbc7 e-con-full expertise-card elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"c33dbc7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f43d766 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"f43d766\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The most professional corporate reflex in the face of an allegation of fraud is to uncover the truth ethically and as quickly as possible. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6a251c elementor-widget-mobile__width-inherit elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"d6a251c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4>Every act of misconduct begins with a small inconsistency. Each day of delay multiplies the rate at which the loss grows.  The way to protect your organization is to clarify suspicions before they escalate. <\/h4><h4 class=\"p1\">By evaluating your suspicions about your organization within the scope of our &#8216;fraud risk simulation&#8217;*, you can get a preliminary assessment of your current risk level.<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7771f12 elementor-widget elementor-widget-spacer\" data-id=\"7771f12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-56e73a5 elementor-widget elementor-widget-spacer\" data-id=\"56e73a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ae67b1 kt-clr e-flex e-con-boxed e-con e-parent\" data-id=\"6ae67b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-337554f e-con-full hero-divider e-flex e-con e-child\" data-id=\"337554f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-631b56b elementor-widget elementor-widget-heading\" data-id=\"631b56b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Measure Your Risk Level with Prosecure Fraud Risk Simulator<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f24f198 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"f24f198\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"276\" data-end=\"670\"><strong data-start=\"276\" data-end=\"305\">Prosecure Fraud Risk Simulator<\/strong> is <strong>a scientific data-based risk assessment platform <\/strong> developed by our investigation specialists for organizations, based <strong>on ACFE criteria <\/strong>, aiming to make internal and employee-related fraud risks visible.   <\/p><p data-start=\"276\" data-end=\"670\">The platform helps you analyze at an early stage <strong data-start=\"550\" data-end=\"632\">which processes, roles and control points of<\/strong> your corporate governance structure <strong data-start=\"550\" data-end=\"632\">are vulnerable to misconduct<\/strong> before misconduct incidents occur in your organization.  <\/p><p data-start=\"276\" data-end=\"670\">It should not be forgotten that detecting and investigating internal fraud signals at an early stage is the most effective way to control financial and reputational gates before they grow.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09a9acb elementor-widget-mobile__width-inherit elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"09a9acb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"672\" data-end=\"1024\">The Fraud Risk Simulator enables you to understand your organization&#8217;s current level of risk, prioritize areas of potential vulnerability, and <strong data-start=\"815\" data-end=\"885\">provide concrete recommendations on where you need to take due diligence and preventive action<\/strong> before launching an in-depth independent investigation. In this way, companies can make <strong data-start=\"980\" data-end=\"1014\">more effective and measured decisions<\/strong> by focusing their resources on the most critical risk areas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-050c982 e-con-full expertise-card elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"050c982\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff04279 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-heading\" data-id=\"ff04279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The most professional corporate reflex in the face of an allegation of fraud is to uncover the truth ethically and as quickly as possible. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f4f0eb elementor-widget-mobile__width-inherit elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"9f4f0eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h4>Every act of misconduct begins with a small inconsistency. Each day of delay multiplies the rate at which the loss grows.  The way to protect your organization is to clarify suspicions before they escalate. <\/h4><h4 class=\"p1\">By evaluating your suspicions about your organization within the scope of our &#8216;fraud risk simulation&#8217;*, you can get a preliminary assessment of your current risk level.<\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-875ae83 elementor-widget elementor-widget-spacer\" data-id=\"875ae83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-309094a elementor-widget elementor-widget-spacer\" data-id=\"309094a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f43e3b1 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile e-flex e-con-boxed e-con e-parent\" data-id=\"f43e3b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5488d2b e-con-full hero-divider e-flex e-con e-child\" data-id=\"5488d2b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a2383b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3a2383b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Fraud Risk<br>Simulator<br>How does it work?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ee5207 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1ee5207\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"fraud-hero-text\">\n<p data-start=\"230\" data-end=\"273\"><strong data-start=\"234\" data-end=\"273\">1. Collection of Data and Indicators<\/strong><\/p>\n<p data-start=\"274\" data-end=\"526\">Critical risk indicators related to organizational structure, processes and human factors are pre-assessed based on existing documents, process definitions and limited data sets. The aim is to identify key signals associated with fraud risk at an early stage. <\/p>\n<p data-start=\"528\" data-end=\"578\"><strong data-start=\"532\" data-end=\"578\">2. Analysis and Modeling of Risk Areas<\/strong><\/p>\n<p data-start=\"579\" data-end=\"813\">The collected data is analyzed in the light of fraud scenarios and sectoral references. At this stage, a holistic risk model reveals which processes, roles, or control points of the organization are more vulnerable to fraud. <\/p>\n<p data-start=\"815\" data-end=\"871\"><strong data-start=\"819\" data-end=\"871\">3. Prioritization and Roadmap Development<\/strong><\/p>\n<p data-start=\"872\" data-end=\"1092\">Analysis results are prioritized according to impact and probability criteria. By creating an organization-specific risk map, a clear roadmap is presented on which areas require in-depth examination or preventive action. <\/p>\n<p data-start=\"872\" data-end=\"1092\"><\/p>\n\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8039a10 e-flex e-con-boxed e-con e-parent\" data-id=\"8039a10\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7b8ad73 elementor-widget elementor-widget-button\" data-id=\"7b8ad73\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/prosecure.com.tr\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">In-House Fraud Risk Simulator<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08682dd elementor-widget elementor-widget-spacer\" data-id=\"08682dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0c2016 elementor-widget elementor-widget-text-editor\" data-id=\"b0c2016\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>To use Prosecure Fraud Risk Simulator for free, please fill out the Contact Form.  <\/strong><br><strong>Simulator link will be sent to your email address.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f41762e elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"f41762e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>* A data-driven pre-assessment approach that makes potential fraud risks visible at an early stage.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7285501 elementor-widget elementor-widget-spacer\" data-id=\"7285501\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c7c128 e-flex e-con-boxed e-con e-parent\" data-id=\"0c7c128\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5b2f888 e-con-full hero-divider e-flex e-con e-child\" data-id=\"5b2f888\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4136537 elementor-widget elementor-widget-heading\" data-id=\"4136537\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Value Propositions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d0004e6 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"d0004e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><h4>Investigative methods developed by a founding leader, a graduate of the FBI National Academy, taking into account ACFE criteria, completely tailored to our company.<\/h4><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fada1c elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4fada1c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><h4>25+ years of proven public and private sector experience in White Collar Crime, Skilled Fraud and Anti-Money Laundering.<\/h4><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d80429 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1d80429\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><h4>Investigation processes personally managed by Senior Leadership from start to finish.<\/h4><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e2f61f elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1e2f61f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><h4>Advanced investigative methods tailored to each individual misconduct case.<\/h4><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1cd24d elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"c1cd24d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><h4>Reporting that is appropriate for administrative and judicial proceedings and complies with legally admissible standards of evidence.<\/h4><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f239302 elementor-widget-mobile__width-inherit elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"f239302\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Each fraud investigation conducted at Prosecure is initiated, executed and finalized under the operational leadership of <a href=\"https:\/\/prosecure.com.tr\/en\/homepage\/hasan-alsancak\/\">Hasan Alsancak<\/a>.<\/p><p>The entire process and management presentation &#8211; from the initial interviews to the submission of the final report clarifying the suspicion &#8211; is handled single-handedly by a single senior leader and investigation team. No case file is handed over to other experts upon receipt. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75fd104 elementor-widget elementor-widget-heading\" data-id=\"75fd104\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\n\n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fea9d7 elementor-widget-mobile__width-inherit elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget elementor-widget-text-editor\" data-id=\"9fea9d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Every fraud incident develops with different dynamics and no two cases are the same. For this reason, Prosecure investigates each case using case-specific methods, not standard templates.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-547ea58 kt-clr e-flex e-con-boxed e-con e-parent\" data-id=\"547ea58\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-500ca55 e-con-full hero-divider e-flex e-con e-child\" data-id=\"500ca55\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-20663a5 elementor-widget elementor-widget-heading\" data-id=\"20663a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Highlights of our Fraud Investigation, Prevention and Compliance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5ea33a elementor-widget elementor-widget-spacer\" data-id=\"b5ea33a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-431a9d6 e-con-full e-flex e-con e-child\" data-id=\"431a9d6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9164d7d e-con-full expertise-card e-flex e-con e-child\" data-id=\"9164d7d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb2f93b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"fb2f93b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" id=\"Capa_1\" x=\"0px\" y=\"0px\" viewBox=\"0 0 480.182 480.182\" style=\"enable-background:new 0 0 480.182 480.182;\" xml:space=\"preserve\"><g>\t<g>\t\t<path d=\"M200.182,32.106c-92.784,0-168,75.216-168,168s75.216,168,168,168s168-75.216,168-168    C368.081,107.364,292.924,32.207,200.182,32.106z M200.182,48.106c49.416,0.039,95.723,24.123,124.128,64.56l-20,20    c-4.867-2.945-10.439-4.521-16.128-4.56c-17.673,0-32,14.327-32,32c0.028,5.695,1.595,11.276,4.536,16.152l-52.384,52.384    c-9.919-6.048-22.385-6.048-32.304,0l-36.384-36.384c2.941-4.876,4.508-10.457,4.536-16.152    c0.022-17.638-14.258-31.954-31.896-31.976c-14.587-0.018-27.332,9.849-30.968,23.976h-29.68    C66.785,98.159,128.614,48.211,200.182,48.106z M304.182,160.106c0,8.837-7.163,16-16,16s-16-7.163-16-16s7.163-16,16-16    S304.182,151.269,304.182,160.106z M208.182,256.106c0,8.837-7.163,16-16,16s-16-7.163-16-16c0-8.837,7.163-16,16-16    S208.182,247.269,208.182,256.106z M128.182,176.106c0,8.837-7.163,16-16,16s-16-7.163-16-16s7.163-16,16-16    S128.182,167.269,128.182,176.106z M274.036,333.012c-22.592,12.544-48.012,19.116-73.854,19.093    c-83.89,0.057-151.943-67.902-152-151.792c-0.004-5.414,0.282-10.825,0.856-16.208h32.28c3.637,14.085,16.317,23.945,30.864,24    c5.695-0.028,11.276-1.595,16.152-4.536l36.384,36.384c-2.941,4.876-4.508,10.457-4.536,16.152c0,17.673,14.327,32,32,32    s32-14.327,32-32c-0.028-5.695-1.595-11.276-4.536-16.152l52.384-52.384c4.876,2.941,10.457,4.508,16.152,4.536    c17.673,0,32-14.327,32-32c-0.028-5.695-1.595-11.276-4.536-16.152l17.44-17.432C373.801,199.849,347.363,292.298,274.036,333.012    z\"><\/path>\t<\/g><\/g><g>\t<g>\t\t<path d=\"M400.182,80.106c14.547-0.055,27.227-9.914,30.864-24h49.136v-16h-49.136c-3.637-14.086-16.317-23.945-30.864-24    c-17.673,0-32,14.327-32,32c0.028,5.695,1.595,11.276,4.536,16.152l-14.056,14.056C291.407-9.307,165.855-25.817,78.234,41.438    S-25.897,234.246,41.358,321.867c63.484,82.707,179.855,102.77,267.368,46.095l24.144,24.144l11.312,11.312l64.4,64.4    c16.379,16.379,42.933,16.379,59.312,0c16.379-16.379,16.379-42.933,0-59.312l-64.4-64.4l-11.312-11.312l-24.144-24.144    c42.859-66.016,42.859-151.071,0-217.088l16-16C388.911,78.504,394.49,80.074,400.182,80.106z M400.182,32.106    c8.837,0,16,7.163,16,16s-7.163,16-16,16s-16-7.163-16-16S391.346,32.106,400.182,32.106z M456.582,419.818    c10.246,10.016,10.433,26.442,0.417,36.688c-10.016,10.246-26.442,10.433-36.688,0.417c-0.141-0.137-0.279-0.276-0.417-0.417    l-64.4-64.4l36.688-36.688L456.582,419.818z M380.87,344.106l-36.688,36.688l-22.144-22.144c1.128-0.864,2.184-1.816,3.296-2.704    s2.4-1.952,3.592-2.952c1.752-1.472,3.48-2.96,5.176-4.488c0.872-0.8,1.704-1.6,2.56-2.4c3.28-3.072,6.456-6.248,9.528-9.528    c0.8-0.856,1.6-1.688,2.4-2.56c1.528-1.696,3.016-3.424,4.488-5.176c1.003-1.184,1.987-2.381,2.952-3.592    c0.88-1.104,1.832-2.16,2.696-3.288L380.87,344.106z M349.846,306.946c-2.52,3.52-5.12,6.968-7.864,10.288    c-0.8,0.968-1.656,1.904-2.48,2.856c-2.448,2.848-4.976,5.611-7.584,8.288c-1.136,1.173-2.291,2.328-3.464,3.464    c-2.667,2.608-5.429,5.136-8.288,7.584c-0.952,0.8-1.888,1.672-2.856,2.48c-3.32,2.744-6.768,5.344-10.288,7.864    c-82.816,59.165-197.915,39.992-257.08-42.824S9.95,109.031,92.766,49.866S290.681,9.873,349.846,92.69    C395.627,156.772,395.627,242.864,349.846,306.946z\"><\/path>\t<\/g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><g><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff6a283 elementor-widget elementor-widget-heading\" data-id=\"ff6a283\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">FBI Based Investigation Methodology\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59f7706 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"59f7706\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Through FBI investigative techniques, ACFE standards, cross-examination and AI-powered data analysis tools, the perpetrators, motivation, methodology, internal control weaknesses exploited and financial impact of the alleged fraud are examined in detail.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b6b7bc2 e-con-full expertise-card e-flex e-con e-child\" data-id=\"b6b7bc2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-557003f elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"557003f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_1\" height=\"512\" viewBox=\"0 0 511.898 511.898\" width=\"512\"><g><g><g><path d=\"m136.51 150.653c1.953 1.952 4.512 2.929 7.071 2.929s5.118-.977 7.071-2.929c3.905-3.905 3.905-10.237 0-14.143l-17.429-17.429c-3.906-3.904-10.236-3.904-14.143 0-3.905 3.905-3.905 10.237 0 14.143z\"><\/path><path d=\"m95.618 198.379h24.647c5.522 0 10-4.478 10-10s-4.477-10-10-10h-24.647c-5.522 0-10 4.478-10 10 0 5.523 4.477 10 10 10z\"><\/path><path d=\"m188.38 130.265c5.522 0 10-4.478 10-10v-24.648c0-5.522-4.478-10-10-10s-10 4.478-10 10v24.647c0 5.523 4.477 10.001 10 10.001z\"><\/path><path d=\"m374.063 359.92c-3.906-3.904-10.236-3.904-14.143 0-3.905 3.905-3.905 10.237 0 14.143l17.429 17.429c1.953 1.952 4.512 2.929 7.071 2.929s5.118-.977 7.071-2.929c3.905-3.905 3.905-10.237 0-14.143z\"><\/path><path d=\"m414.956 312.194h-24.647c-5.522 0-10 4.478-10 10 0 5.523 4.478 10 10 10h24.647c5.522 0 10-4.477 10-10s-4.478-10-10-10z\"><\/path><path d=\"m322.194 380.308c-5.522 0-10 4.478-10 10v24.647c0 5.522 4.478 10 10 10s10-4.478 10-10v-24.647c0-5.523-4.477-10-10-10z\"><\/path><path d=\"m480.151 31.746c-42.332-42.328-111.206-42.328-153.536 0l-77.737 77.737c-30.284 30.285-39.553 75.097-25.167 114.226-39.129-14.386-83.941-5.117-114.226 25.168l-77.737 77.737c-42.329 42.33-42.329 111.205 0 153.536 21.166 21.164 48.967 31.747 76.769 31.747s55.603-10.583 76.768-31.747l77.737-77.737c30.285-30.285 39.553-75.097 25.167-114.226 12.107 4.451 24.759 6.639 37.355 6.639 28.114 0 55.957-10.892 76.871-31.806l77.737-77.737c42.328-42.331 42.328-111.206-.001-153.537zm-292.922 292.922c6.879 6.878 15.914 10.317 24.95 10.317 3.835 0 7.67-.62 11.34-1.859-1.438 7.23-4.983 13.974-10.398 19.388l-77.736 77.736c-7.162 7.163-16.705 11.108-26.869 11.107-10.164 0-19.707-3.944-26.869-11.107-7.163-7.162-11.108-16.705-11.108-26.869s3.944-19.707 11.107-26.869l77.737-77.738c5.414-5.414 12.158-8.959 19.388-10.396-4.159 12.317-1.34 26.492 8.458 36.29zm123.297-101.682-87.54 87.54c-5.959 5.957-15.655 5.959-21.614 0s-5.959-15.655 0-21.614l87.54-87.54c2.979-2.979 6.893-4.47 10.808-4.47 3.913 0 7.827 1.49 10.807 4.47 5.958 5.958 5.958 15.655-.001 21.614zm-61.648 165.285-77.737 77.737c-34.531 34.531-90.72 34.531-125.251 0-34.531-34.532-34.531-90.72 0-125.251l77.737-77.737c17.065-17.066 39.778-25.952 62.716-25.952 10.954 0 21.963 2.029 32.426 6.162l-24.928 24.928c-17.87-2.384-35.699 3.574-48.601 16.476l-77.737 77.736c-10.939 10.94-16.965 25.505-16.965 41.012s6.025 30.071 16.966 41.012 25.505 16.965 41.012 16.965c15.506 0 30.072-6.025 41.012-16.965l77.736-77.736c12.902-12.902 18.857-30.73 16.477-48.601l24.928-24.928c12.786 32.37 5.425 69.926-19.791 95.142zm217.131-217.131-77.737 77.737c-25.216 25.216-62.772 32.579-95.142 19.791l24.927-24.927c17.88 2.378 35.699-3.573 48.585-16.461l6.67-6.64c3.914-3.896 3.929-10.228.032-14.142-3.895-3.913-10.227-3.929-14.142-.032l-6.686 6.655c-5.415 5.415-12.158 8.962-19.389 10.4 4.16-12.318 1.341-26.493-8.458-36.292-9.799-9.798-23.974-12.617-36.291-8.458 1.438-7.23 4.983-13.974 10.398-19.389l77.736-77.737c14.815-14.815 38.922-14.816 53.739.001 7.163 7.162 11.108 16.705 11.108 26.869 0 10.165-3.944 19.707-11.108 26.869-.156.156-.307.318-.452.483l-6.683 6.683c-3.905 3.905-3.905 10.237 0 14.142 3.906 3.904 10.236 3.904 14.143 0l7.15-7.15c.174-.175.341-.354.499-.537 10.614-10.879 16.45-25.228 16.45-40.49 0-15.507-6.025-30.071-16.965-41.012-22.614-22.612-59.41-22.613-82.024-.001l-77.736 77.737c-12.902 12.902-18.857 30.731-16.477 48.602l-24.927 24.927c-12.786-32.371-5.426-69.926 19.791-95.142l77.737-77.737c34.532-34.531 90.721-34.531 125.251 0 34.532 34.532 34.532 90.72.001 125.251z\"><\/path><path d=\"m407.589 177.628c-1.657-3.974-5.826-6.524-10.127-6.129-4.144.38-7.682 3.357-8.763 7.373-1.066 3.962.472 8.331 3.829 10.711 3.423 2.427 8.048 2.463 11.508.092 3.845-2.635 5.313-7.75 3.553-12.047z\"><\/path><\/g><\/g><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b65e566 elementor-widget elementor-widget-heading\" data-id=\"b65e566\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Chain of Evidence\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a14f514 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"a14f514\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Documents, data, financial records, and statements are protected in a legally admissible manner; every step in the chain of evidence is recorded. The findings obtained serve as &#8216;preliminary evidence&#8217; for judicial investigation.  It provides a legal basis for administrative and judicial processes. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50e3d54 e-con-full expertise-card e-flex e-con e-child\" data-id=\"50e3d54\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34e3c3a elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"34e3c3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" id=\"Capa_1\" height=\"512\" viewBox=\"0 0 512 512\" width=\"512\"><g><path d=\"m507.786 64.62c-.304-.286-60.445-57.641-60.445-57.641-2.299-2.206-4.677-4.486-9.117-4.486h-242.12c-7.072 0-12.826 5.753-12.826 12.825v39.383l-85.335 14.628c-6.84 1.2-11.44 7.746-10.255 14.579l4.331 25.252c-27.737 9.334-56.214 18.956-83.705 28.831-6.496 2.375-9.905 9.598-7.587 16.133l54.685 152.016c1.1 3.059 3.983 4.964 7.058 4.964.842 0 1.7-.143 2.538-.445 3.898-1.402 5.921-5.698 4.519-9.596l-53.876-149.768c25.9-9.273 52.722-18.349 78.935-27.172l25.771 150.245 29.654 173.032c1.071 6.108 6.44 10.454 12.5 10.454.686 0 1.382-.056 2.08-.171l80.316-13.783 62.76-10.758-94.391 33.927-74.435 26.763-57.808-160.789c-1.401-3.898-5.696-5.921-9.595-4.52-3.898 1.401-5.921 5.697-4.52 9.595l58.628 163.074c1.875 5.128 6.733 8.316 11.868 8.316 1.419 0 2.86-.244 4.264-.757l76.671-27.566 174.094-62.574 33.259-5.701h73.471c7.072 0 12.826-5.766 12.826-12.854v-326.985c.001-4.489-2.435-6.779-4.213-8.451zm-19.871 1.776h-37.53l-.93.004c-1.797.012-6.004.043-7.071-1.017-.246-.245-.534-1.063-.534-2.582l-.087-40.415zm9.085 331.512h-298.722v-146.167c0-4.142-3.358-7.5-7.5-7.5s-7.5 3.358-7.5 7.5v148.313c0 7.087 5.754 12.854 12.826 12.854h140.812l-94.545 16.206-77.982 13.383-29.248-170.665-32.269-188.13 80.405-13.783v147.022c0 4.142 3.358 7.5 7.5 7.5s7.5-3.358 7.5-7.5v-199.449h228.475l.098 45.326c0 5.494 1.671 9.938 4.966 13.21 5.063 5.027 12.22 5.377 16.663 5.377.382 0 .744-.003 1.083-.005l47.438-.003z\"><\/path><path d=\"m234.43 118.949c0 4.142 3.358 7.5 7.5 7.5h214.436c4.142 0 7.5-3.358 7.5-7.5s-3.358-7.5-7.5-7.5h-214.436c-4.142 0-7.5 3.358-7.5 7.5z\"><\/path><path d=\"m456.366 164.731h-214.436c-4.142 0-7.5 3.358-7.5 7.5s3.358 7.5 7.5 7.5h214.436c4.142 0 7.5-3.358 7.5-7.5s-3.358-7.5-7.5-7.5z\"><\/path><path d=\"m456.366 218.013h-214.436c-4.142 0-7.5 3.358-7.5 7.5s3.358 7.5 7.5 7.5h214.436c4.142 0 7.5-3.358 7.5-7.5s-3.358-7.5-7.5-7.5z\"><\/path><path d=\"m456.366 271.295h-214.436c-4.142 0-7.5 3.358-7.5 7.5s3.358 7.5 7.5 7.5h214.436c4.142 0 7.5-3.358 7.5-7.5s-3.358-7.5-7.5-7.5z\"><\/path><path d=\"m456.366 324.578h-214.436c-4.142 0-7.5 3.358-7.5 7.5s3.358 7.5 7.5 7.5h214.436c4.142 0 7.5-3.358 7.5-7.5s-3.358-7.5-7.5-7.5z\"><\/path><\/g><\/svg>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b0ca26 elementor-widget elementor-widget-heading\" data-id=\"9b0ca26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Management Focused Reporting\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0cef035 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"0cef035\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Complex investigation methods and findings are reported to management in a simple, systematic and feasible action plan, without getting bogged down in technical jargon. The reports also clearly identify areas for improvement and development. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f57773 e-flex e-con-boxed e-con e-parent\" data-id=\"4f57773\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-c072219 hero-divider e-flex e-con-boxed e-con e-child\" data-id=\"c072219\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e645d11 elementor-widget elementor-widget-button\" data-id=\"e645d11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/prosecure.com.tr\/en\/contact\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Initiate a Fraud Investigation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29337bb elementor-widget elementor-widget-spacer\" data-id=\"29337bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fbe249 elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4fbe249\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Assessing internal fraud signals at an early stage is the most effective way to contain financial and reputational damage before it escalates. An independent fraud investigation clearly identifies risks and enables you to take the right actions in a timely manner, preventing further losses for your organization. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e9aee06 e-flex e-con-boxed e-con e-parent\" data-id=\"e9aee06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f61b888 e-con-full hero-divider e-flex e-con e-child\" data-id=\"f61b888\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dae470a elementor-widget elementor-widget-heading\" data-id=\"dae470a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Asked Questions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b116ff0 elementor-widget elementor-widget-spacer\" data-id=\"b116ff0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d9575b elementor-widget elementor-widget-n-accordion\" data-id=\"1d9575b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3100\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3100\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What is the difference between Fraud Investigation and Internal Audit? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3100\" class=\"elementor-element elementor-element-efa49ab e-con-full e-flex e-con e-child\" data-id=\"efa49ab\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0fe047b elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"0fe047b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">Internal audit is a systematic assurance activity that assesses the compliance of processes with policies, procedures and legislation through pre-planned controls.<\/p><p class=\"p1\">A fraud examination is a structured and professional investigation process initiated on a specific suspicion or allegation, in which the relevant act is investigated based on evidence.<\/p><p class=\"p1\">The main purpose of this process is to uncover by whom, by which methods, and what control or system weaknesses resulted from the fraud.<\/p><p> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3101\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3101\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Why should misconduct cases always be investigated by independent investigators? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3101\" class=\"elementor-element elementor-element-4e9b72d e-con-full e-flex e-con e-child\" data-id=\"4e9b72d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f42adeb elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"f42adeb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">According to ACFE, a significant proportion of fraud cases are related to internal control weaknesses, management pressure and abuse of authority. In an environment where fraud itself is fed by internal relationships, conducting the investigation within the same relationships may cause the risk to reproduce itself.   <strong>For this reason, the ACFE recognizes the principle of an independent investigator as a de facto standard requirement in internal fraud cases.<\/strong><\/p><p class=\"p1\">In addition, the inherent limitations of in-house teams, hierarchical pressures, potential conflicts of interest and perceptual biases can lead to incomplete, delayed or inaccurate handling of misconduct cases. These structural risks are particularly pronounced where the cases under review are directly linked to internal relationships. <\/p><p class=\"p1\"> <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3102\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3102\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What are the red flags that signal misconduct in an organization? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3102\" class=\"elementor-element elementor-element-d1392a8 e-con-full e-flex e-con e-child\" data-id=\"d1392a8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9a6978a elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"9a6978a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>1) Behavioral Indicators<\/strong><\/p><ul><li>Standard of living that cannot be explained by income level<\/li><li>Overtime, not taking mandatory vacations<\/li><li>Resistance to internal control and audit processes; defensive, aggressive attitude<\/li><\/ul><p><strong>2) Financial Indicators<\/strong><\/p><ul><li>Recurring billing discrepancies,  <\/li><li>Unauthorized transfers, cash shortfalls, or adjustments<\/li><li>Continuous\/single source orientation to the same suppliers, unexplained differences in price breakdown<\/li><\/ul><p><strong>3) Operational \/ Systemic Indicators<\/strong><\/p><ul><li>Unauthorized access attempts, log deletion or frequent changes in access authorizations<\/li><li>Collection of request-approval-payment steps in the same person (concentration of authority)<\/li><li>Spike in file downloads\/sharing, external email redirects<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3103\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3103\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> What should be the first step when an allegation of misconduct arises? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3103\" class=\"elementor-element elementor-element-6cb30f6 e-con-full e-flex e-con e-child\" data-id=\"6cb30f6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1dfc7fc elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"1dfc7fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tThe first step is to closely monitor and, if necessary, block the suspected employee&#8217;s authorizations, and ensure that all digital\/financial records are preserved without deletion. An action plan is then prepared with an impartial fraud investigation team, which reduces the organization&#8217;s reputational, financial and legal operational risk. \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-3104\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-3104\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Can the results of misconduct investigations be used as evidence in the judicial process? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-3104\" class=\"elementor-element elementor-element-ac39d21 e-con-full e-flex e-con e-child\" data-id=\"ac39d21\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f2e7cc elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"7f2e7cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"p1\">In fraud investigations, evidence is collected in accordance with chain of custody principles, preserved in a lawful manner and, when necessary, used as preliminary evidence in criminal or labor law proceedings.<\/p><p class=\"p1\">Prosecutors and judges may request that this preliminary evidence be recollected in accordance with judicial procedures, but these findings are among the key references that determine the direction and influence the pace of investigations and prosecutions.<\/p><p class=\"p1\">In any event, the findings of a fraud investigation are critical elements that directly affect both the speed and the final outcome of judicial and administrative proceedings.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is the difference between Fraud Investigation and Internal Audit?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Internal audit is a systematic assurance activity that assesses the compliance of processes with policies, procedures and legislation through pre-planned controls.A fraud examination is a structured and professional investigation process initiated on a specific suspicion or allegation, in which the relevant act is investigated based on evidence.The main purpose of this process is to uncover by whom, by which methods, and what control or system weaknesses resulted from the fraud.\"}},{\"@type\":\"Question\",\"name\":\"Why should misconduct cases always be investigated by independent investigators?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"According to ACFE, a significant proportion of fraud cases are related to internal control weaknesses, management pressure and abuse of authority. In an environment where fraud itself is fed by internal relationships, conducting the investigation within the same relationships may cause the risk to reproduce itself.   For this reason, the ACFE recognizes the principle of an independent investigator as a de facto standard requirement in internal fraud cases.In addition, the inherent limitations of in-house teams, hierarchical pressures, potential conflicts of interest and perceptual biases can lead to incomplete, delayed or inaccurate handling of misconduct cases. These structural risks are particularly pronounced where the cases under review are directly linked to internal relationships.\"}},{\"@type\":\"Question\",\"name\":\"What are the red flags that signal misconduct in an organization?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"1) Behavioral IndicatorsStandard of living that cannot be explained by income levelOvertime, not taking mandatory vacationsResistance to internal control and audit processes; defensive, aggressive attitude2) Financial IndicatorsRecurring billing discrepancies,  Unauthorized transfers, cash shortfalls, or adjustmentsContinuous\\\/single source orientation to the same suppliers, unexplained differences in price breakdown3) Operational \\\/ Systemic IndicatorsUnauthorized access attempts, log deletion or frequent changes in access authorizationsCollection of request-approval-payment steps in the same person (concentration of authority)Spike in file downloads\\\/sharing, external email redirects\"}},{\"@type\":\"Question\",\"name\":\"What should be the first step when an allegation of misconduct arises?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The first step is to closely monitor and, if necessary, block the suspected employee&#8217;s authorizations, and ensure that all digital\\\/financial records are preserved without deletion. An action plan is then prepared with an impartial fraud investigation team, which reduces the organization&#8217;s reputational, financial and legal operational risk.\"}},{\"@type\":\"Question\",\"name\":\"Can the results of misconduct investigations be used as evidence in the judicial process?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"In fraud investigations, evidence is collected in accordance with chain of custody principles, preserved in a lawful manner and, when necessary, used as preliminary evidence in criminal or labor law proceedings.Prosecutors and judges may request that this preliminary evidence be recollected in accordance with judicial procedures, but these findings are among the key references that determine the direction and influence the pace of investigations and prosecutions.In any event, the findings of a fraud investigation are critical elements that directly affect both the speed and the final outcome of judicial and administrative proceedings.\"}}]}<\/script>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We address employee misconduct cases with the dimensions of perpetrator, method, damage and organizational vulnerability, and provide evidence-based reports suitable for administrative and judicial proceedings. What is Fraud Investigation? Fraud investigation is an evidence-based response to an unexpected suspicion; its purpose is to determine how the violation occurred, by whom, and from which system vulnerability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4715,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4244","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/pages\/4244","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/comments?post=4244"}],"version-history":[{"count":39,"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/pages\/4244\/revisions"}],"predecessor-version":[{"id":6717,"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/pages\/4244\/revisions\/6717"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/media\/4715"}],"wp:attachment":[{"href":"https:\/\/prosecure.com.tr\/en\/wp-json\/wp\/v2\/media?parent=4244"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}