Course not currently available
Judge Seminar 1: Dealing with Economic and Financial Crimes (Jakarta)
Course
In Paris, France ()
Description
-
Type
Course
-
Duration
12 Days
Suitable for: This course is specifically designed for: Judges. Lawyers. Prosecutors. Politicians. Employees of the legal profession. Law Graduates
About this course
Degree or Work Experience
Reviews
Subjects
- IT Law
- Access
- Security
- Information Systems
- Internet
- IT
- Office IT
- Ethics
- Design
- International
- Banking
- Financial
- Law
- Public
- Systems
- Ms Office
- Communication Training
- Financial Training
- IT Security
Course programme
Course Contents, Concepts and Issues
Econimc and Financial Crimes:
- Defining Economic and Financial Crimes (EFCs)
- Public sector corruption: Nigerian and International Perspectives
- The Enron Case
- Impact of globalisation and news media in economic and financial crimes
- Impact of Economic and Financial Crimes on:
- * Individuals
- * Institutions
- * National Economy
- * Global Economy
- Financial Crimes and The Judiciary
- International convention related to Economic & Financial Crimes
- Terrorists financing
- Forfeiture of Assets as a preventive and mechanism
- The Role of the judiciary in combating economic and financial crimes
Financial Crimes and The Judiciary
- International convention related to Economic & Financial Crimes
- Terrorists Financing
- Forfeiture of Assets as a Preventive Mechanism
- The Role of Judiciary in Combating Economic and Financial Crimes
- Instructing Jury on EFCCs Making Judgements based on PerceivedImpact of Financial and Economic Crimes
- Overview of the Nigerian Financial Crime Act 2004 and other related legislations
Information Systems Crimes
- Information Systems Design: An Introduction
- The Internet and Intranet: Design and Access Factors
- Intranet and Internet Security: Firewalls and Security Coding Generation and Application
- Internet Security Breaches: Accidental of Deliberate Breaches
- Information Systems Crimes
- Information Analysis
- Internet Crimes Catalogue
- Internet Crime: Level of Effort for Would-Be Fraudster
- Computer Programming: A Basic Overview
- Computer Viruses: Design, Effect/Counter Viruses
Money Laundering
- Shell Banks
- High-Value Retail
- What is Money Laundering?
- Financial Action Task Force (FATF)
- Modelling Global Money Laundering Flows
- Underground Banking and National Security
- Money Laundering in Casinos
- Charting the maze of electronic money transfers
- Anti-Money Laundering Support Systems
- International Money Laundering Information Network
- The British Money Laundering Legislation 1993
- Statutory Instruments:
- * Money Laundering Regulation 2001 & 2003
- * Drug Trafficking Act 1974
- * Proceeds of Crime Act 1995
- * The Criminal Justice Act 1998
Anti-Fraud and Regulatory Bodies
- The Law Society
- AnCoRR Web
- Fraud Reduction Website
- The United nations Convention against Transnational Organised Crimes and its Protocol
- HM Customs and Excise
- The Serious Fraud Office
- UK Treasury Annual Frayd Reports
- Committee on Standards in Public Life
- UK Financial Services Authority
- NCIS Economic Crime Branch
- Office of the Banking Ombudsman
- OLAF European Anti-Fraud Office
- NASD Regulation Inc.
- Inter-American Convetion against Corruption
- RespondaNet: The America's Accountability/Anti-Corruption Project
- Royal Canadian Mounted Police: Frauds and Scams
- International Bar Association
- Transparency International
- World Bank Institute Governance Group
- World bank Anti-Corruption and Fraud Resources
- International Money Transfer (Banking Fraud and Smuggling)
- The Banking System in Nigeria and UK
- Economic Crimes in Nigeria: Banking Fraud-CBN
- The Independent Banking Advisory Service
- British Bankers' Association
- IBAS
- Consumer Direct: Scams
- Court of Auditors of the European Union
- U.S. Securities and Exchange Commission
- U.S. Financial Crimes Enforcement Network (FinCEN)
- Internat Fraud Complaint Centre
- Australia Scam Watch
- Public Sector Corruption
Information Management & Communication
- Distinguish between Data and Information
- Communication Barriers and Circumvention
- Communication and Risk Management
- Information Disemination
- Eyewitness Unreliability
- Information Security and Case Confidentiality
- Information Release: Secret Documents and Archiving
- Kenetics vs. Kinesiology: Their Impact on Evidence Presented
Ethics In Judgement
- Ethical Headline Cases
- Ethics and Ethical Behaviour
- Ethics and Morality
- Ethical Dilemma
- Ethics: A Historical Perspective
- Ethics In Judgement
- Ethical Judgments
- Ethics and Secularity
- Ethics and Religions Norms
- Ethics and Corporate Responsibility
- Ethical Decision Making
Understanding and Deterring Cybercrime Part 1
- Incidence and implications of ‘theft of service’ (including telecom) fraud
- Trade secret theft as a cybercrime
- Understanding malicious code
- Recognising and averting spamming
- Cyberstalking as a crime: Exploring volunerabilities and remedies
- What is involved in ‘denial-of-service’ attacks
- Dealing with copyright violation
- Understanding and Dealing with securities fraud
Understanding and Dettering Cybercrimes Part 2
- Trojans and Industrial Espionage
- Nigerian '4-1-9 Scheme' or 'Advance Fee Scheme': profiling Victim and Fraudsters
- Pornographic Grading
- Detecting and Remedying Child Pornography
- 'Peer Netrowk' Crimes: The Role of ISPs
- Authorised Online Access: Access Control Measures
- Child Pornography and On-line Grooming: Incidence and Aversion
- Child Pornography and Chatroom Monitoring: Technology Available
- Identifying Theft through Hacking and Phishing
Judge Seminar 1: Dealing with Economic and Financial Crimes (Jakarta)