Chapter 9 in the course textbook introduces the topic of insider fraud in the workplace. An article published in late 2015 stated that a study conducted by Kroll, a leading global provider of risk solutions, suggested that “Three-quarters of companies (75%) had fallen victim to a fraud incident in the past year” (Business Wire, 2015). One observation posted in the article was that “old fashioned theft, bribery, and kickbacks are still amazingly effective and pervasive” (Business Wire, 2015). Ironically, the study found that only 2% of the fraud was a result of illegal activity committed by an external hacker. The article goes on to state that statistically, the best defense against insider fraud is the exposure of the criminal activity by a “whistleblower” (Business Wire, 2015).
Question:
Consider the following: In your position as an IT Department supervisor, you notice while skimming through some logged audit data that a fellow employee and close friend had copied insignificant, non-secure, non-confidential data from his/her system to an external storage device against company policy. Would you report the activity to the appropriate personnel in senior management per the stated requirement published in the company’s HR manual?” Go beyond a simple “yes” or “no” response by providing your reasons and justifications for taking such a position.