Bulletin Board - Document Comments

Bulletin Board - Review and Comment

Step 1 of 4: Comment on Document

How to make a comment?

1. Use this Protected Document to open a comment box for your chosen Section, Part, Heading or clause.

2. Type your feedback into the comments box and then click "save comment" button located in the lower-right of the comment box.

3. Do not open more than one comment box at the same time.

4. When you have finished making comments proceed to the next stage by clicking on the "Continue to Step 2" button at the very bottom of this page.

 

Important Information

During the comment process you are connected to a database. Like internet banking, the session that connects you to the database may time-out due to inactivity. If you do not have JavaScript running you will receive a message to advise you of the length of time before the time-out. If you have JavaScript enabled, the time-out is lengthy and should not cause difficulty, however you should note the following tips to avoid losing your comments or corrupting your entries:

  1. DO NOT jump between web pages/applications while logging comments.

  2. DO NOT log comments for more than one document at a time. Complete and submit all comments for one document before commenting on another.

  3. DO NOT leave your submission half way through. If you need to take a break, submit your current set of comments, take a note of where you up to and return later to make a further submission.

  4. DO NOT exit from the interface until you have completed all three stages of the submission process.

  5. If you would like a copy of the comments you made via the Bulletin Board, please email policy@rmit.edu.au and specify which document you provided feedback on and a copy of your submission will be emailed to you.

 

Fraud and Corruption Investigation Instruction

Section 1 - Purpose

(1) This Instruction provides details on how fraud and corruption investigations are conducted at RMIT. It aligns with expectations for professional, fair, thorough and skilled investigations outlined in Australian Standard AS8001:2021 Fraud and Corruption Control. 

Top of Page

Section 2 - Authority

(2) Authority for this document is established by the Fraud and Corruption Control Policy.

Top of Page

Section 3 - Scope

(3) This Instruction applies to fraud and corruption investigations conducted anywhere across the RMIT Group.

(4) Not all allegations of fraud or corruption are investigated internally by RMIT. After a preliminary assessment, the case may be referred to the police or an external agency (e.g. the Independent Broad-based Anti-Corruption Commission) by the Executive Director, Governance, Legal and Strategic Operations.

Top of Page

Section 4 - Instruction

(5) RMIT’s internal investigators are appropriately skilled and experienced officers who are independent of the business unit in which the alleged fraud or corruption has occurred.

Investigation stages

(6) A fraud or corruption investigation typically has the following stages:

  1. receiving and recording an allegation
  2. preliminary assessment and immediate response
  3. planning
  4. collecting evidence, including from witnesses and the person suspected of committing the fraud or corruption
  5. assessing evidence 
  6. reporting findings, internally and potentially to external agencies.

Receiving and recording an allegation

(7) There are multiple avenues within RMIT for employees, students or third parties to disclose suspected fraud or corruption, including on the Complaints Portal, to supervisors, the Whistleblower Coordinator, the Director, Risk Management, or directly to Central Complaints and Investigations. All fraud and corruption allegations are directed from these recipients to the Associate Director, Central Complaints and Investigations to triage and allocate to an investigator, or refer to an external body where required to by law.

(8) Employees can seek advice from CCentral Complaints and Investigations if they are uncertain about whether to disclose an allegation of fraud or corruption to RMIT or to an external body.

(9) Initial allegations are completely and accurately documented, including the components of each allegation to assist in planning the investigation.

Preliminary assessment

(10) Investigators determine the legislation or policies that are relevant to the suspected fraud or corruption investigation and the implications from those instruments, e.g. where criminal legislation is relevant, more stringent rules of evidence may apply, and where there is a public interest disclosure there may be additional protection offered to the person who disclosed the corruption.

(11) The preliminary assessment also considers whether:

  1. there have been similar matters or allegations in the past that may inform how the investigation is conducted and where there are potential gaps in fraud and corruption risk controls
  2. the matter needs to be promptly reported to regulators, law enforcement, or insurers
  3. the suspected fraud or corruption requires an immediate response to further protect RMIT assets (see section below).

Immediate response

(12) On the discovery of fraud or corruption, RMIT investigators:

  1. identify the parties involved, both internal and external to RMIT
  2. identify as quickly as possible if funds have been removed from RMIT’s bank account
  3. where applicable, freeze RMIT bank accounts to prevent any further leakage of funds through unauthorised transactions that are awaiting processing
  4. take swift legal action to freeze an account into which RMIT’s funds have been transferred, where this has been identified
  5. quarantine and capture digital and other physical evidence, and secure it to prevent the removal or destruction of evidence
  6. assess the impact on RMIT and activate the relevant response and recovery plan
  7. suspend suspected employees and deactivate their access to systems and facilities.

(13) The early capture of digital evidence is performed by a forensic information technology expert in accordance with the International Standard ISO/IEC 27037 Information Technology – Security Techniques – Guidelines for identification, collection, acquisition, and preservation of digital evidence.

Investigation activities and evidence collection

(14) Investigators prepare an investigation plan that documents:

  1. the background to the matter
  2. objectives of the investigation
  3. preliminary steps
  4. resourcing for the investigation
  5. potential sources of evidence and potential witnesses
  6. legal considerations for capturing evidence
  7. storage of evidence
  8. risks associated with the investigation and to the investigators, and
  9. reporting requirements.

(15) Investigators may employ any of the following activities when investigating allegations of fraud or corruption:

  1. interviewing witnesses and persons suspected of involvement in fraud and corruption, and obtaining statements
  2. data search and seizure
  3. reviewing and collating documentary evidence, including but not limited to telephone records, emails, employee files, building access records, video surveillance
  4. forensic examination of computer systems and captured digital evidence
  5. search of physical offices for documentary and physical evidence
  6. enquiries with financial institutions, subject to obtaining appropriate court orders
  7. expert witness and specialist testimony
  8. tracing funds, assets or goods
  9. liaison with police, other law enforcement agencies or regulatory agencies.

(16) Interviews are carefully planned to ensure all pertinent information is collected in a way that enhances credibility. Planning includes topics and the order in which they are covered, questions for each topic and the way they will be asked, evidence to be presented to the interviewee, and detailed knowledge of evidence that has been collected.

Notifying the respondent

(17) When a complaint is referred for investigation, the Central Complaints and Investigations team notify in writing the person suspected of the fraudulent or corrupt conduct (the respondent) and include:

  1. an outline of the allegation
  2. clear instructions about maintaining confidentiality with respect to all aspects of the investigation
  3. a summary of any initial assessment that has been made to determine whether policies have been breached or laws broken
  4. referral to the relevant policies and procedures
  5. an invitation to respond in writing to provide evidence for the investigator to consider.

Procedural fairness

(18) Investigations of suspected fraud or corruption are conducted in a manner consistent with the principles of natural justice and procedural fairness. This means:

  1. decision makers are impartial, or where applicable, disclose and manage any conflicts of interest that may be perceived to affect their impartiality
  2. decisions are based on the balance of relevant evidence to ensure decisions are well founded and defensible
  3. persons being investigated have an opportunity to respond to a case against them and to present their own case
  4. investigations are managed in a timely manner to mitigate the impact on the affected parties
  5. all information pertaining to the investigation is treated as confidential and only disclosed where necessary to meet legislative or law enforcement requirements.

(19) In addition to considering evidence about what occurred, consideration is given to whether the persons involved knew or should have known that the conduct was forbidden.

Record keeping

(20) For each investigation, RMIT records:

  1. a list of the allegations under investigation
  2. key decisions, actions and communications
  3. working papers that demonstrate the investigative procedures performed and the basis for findings and conclusions
  4. details of liaison with law enforcement and regulatory agencies
  5. proof of adherence to principles of procedural fairness (refer to clause 17 above)
  6. anything subject to legal professional privilege
  7. the use of investigative powers and the source of those powers (e.g. contract, enterprise agreement, policy)
  8. the investigation report and all its attachments
  9. quality review of the investigation and report.

(21) Investigation records are prepared, maintained and retained in accordance with the Information Governance Policy and the Privacy Policy, and comply with the requirements for the Victorian Auditor-General’s Office and IBAC.

(22) All evidence captured is recorded at the time it is collected, always held securely, and accounted for each time it is handed to another party (known as continuity of evidence or chain of custody).

(23) RMIT may capture oral evidence through audio or video recordings with the knowledge of the participants and in accordance with relevant policies such as the Complaints Governance Policy, e.g. in the presence of a support person for the interviewee.

(24) Recordings are made in a manner that is likely to ensure that information obtained from the interviews is admissible in court, such as having the person confirm on the recording that they have given permission for the recording.

(25) Interviews may be converted to written form and preferably signed or acknowledged as true and accurate by the participants.

(26) Any exculpatory evidence is recorded, i.e. evidence that is favourable to the person suspected of fraud or corruption and which may exonerate them.

Assessing evidence and reporting findings

(27) Investigators methodically check that every element of every allegation has been properly covered in the investigation.

(28) Reports of an investigation recognise the need to protect whistleblowers and exhibit fair treatment of the person who has allegedly engaged in fraudulent or corrupt conduct.

(29) Reports include an executive summary, background, details of each allegation, relevant evidence collected, assessment of the evidence, conclusion and recommendations.

(30) Reports include an assessment of whether there was a serious breakdown of fraud and corruption risk  controls, and how these controls could be improved to prevent further incidents.

(31) If there appears to be adequate evidence to support either a criminal prosecution or further investigation by the police, the investigator works with Legal Services to prepare a police brief.

Determining the outcome

(32) The response to an adverse finding must be proportional to the seriousness of the fraud or corruption.

(33) At the conclusion of an investigation, the findings are referred to the relevant senior officer as prescribed by the Delegation of Authority Schedule 3 – People Delegations, to determine the outcome for the employee in terms of their employment at RMIT, in accordance with relevant policies and enterprise agreements.