Preventing and Investigating in the Workplace

Total Page:16

File Type:pdf, Size:1020Kb

Preventing and Investigating in the Workplace Risk and Compliance Preventing and investigating FRAUD in the workplace Preventing and investigating fraud in the workplace | 1 2 | Preventing and investigating fraud in the workplace Contents Introduction ..............................................................4 How corporate governance can help prevent fraud ...........................................................6 Could you spot a potential fraudster? ...................14 Ways to reduce the risk of fraud ...........................16 Key employment law issues for fraud prevention ....................................................20 Monitoring staff phone calls, email and internet use ............................................................24 Can insurance help to manage fraud risk? ...........32 What policies and procedures should you have in place in case fraud occurs? ......................34 Enabling employees to report fraud .....................40 Discovery of a fraud: the first 24 hours .................46 Ensuring that your investigation complies with employment law obligations .........................50 Data retention and recovery: where to look and what (not) to do: ..............................................54 Freezing assets and tracing funds ........................60 Involving the police and criminal investigations ...66 Using private investigators ....................................72 Useful contacts ......................................................78 Preventing and investigating fraud in the workplace | 3 Fraud continues to be a significant issue for many businesses. But it is a risk that can be reduced and managed to some extent. Almost all frauds against a business will involve employees - sometimes as perpetrators and sometimes as the innocent dupes of outsiders. We continue to see cases where our clients lose money by falling victim to a dishonest employee who, had thorough vetting been carried out, might not have been hired. We see cases where employees have been able to defraud their employer by methods that could have been detected if proper procedures were followed. And we see cases where employees have been tricked into overriding standard procedures and clients have lost substantial funds as a result. Three examples from recent cases we have dealt with may illustrate some of these points. Case 1: An accounts payable clerk received an email apparently from a supplier saying that the supplier’s bank account details had changed and quoting a new sort code and account number. Without further checking the clerk directs payments to the new account, which of course is not genuine. Substantial funds are lost before the problem comes to light as a result of the genuine supplier chasing for non-payment. A few simple checks could have prevented this. Case 2: A senior member of the finance department has the authority to approve his own expense claims. An internal audit identifies this as a risk area and recommends that an additional level of approval is introduced. The internal audit report is not acted on and substantial false expenses continue to be submitted, fraudulently approved and paid. Case 3: An accounts payable clerk operated an online payment platform provided by a bank. This was designed to provide an efficient payment system with proper approval processes. The clerk was telephoned by someone impersonating the CEO who convinced the clerk that the company had to make highly confidential payments for a transaction overseas that should not be discussed with anyone except the CEO and a previously unknown external lawyer. The clerk received apparently approved invoices and payment instructions by email from the supposed lawyer, purportedly signed by the CEO and the Group Treasurer. Substantial payments were made to an overseas bank, only some of which were intercepted and recovered. The accounts clerk bypassed the online payment platform, failed to carry out basic checks and accepted someone she thought was the CEO telling her on the phone that the payments were highly confidential and should not be discussed with anyone else within the organisation. These experiences reinforce some basic messages: • Carry out background and reference checks when recruiting. Speak to referees. • Staff carrying out any aspect of payment functions should be reminded that there are people out there keen to steal your money and they need to be eternally vigilant. Under no circumstances should they depart from established and proper procedures; they are there for a purpose. Ensure that staff are trained to appreciate that each one of them is potentially in the front line of defence against a fraudulent attack on the business. 4 | Preventing and investigating fraud in the workplace • Someone, no matter how senior they are, telling an employee that a transaction is confidential and should not be discussed with anyone else is a clear warning sign. Most businesses do not need to make confidential payments. Anyone told to make one should immediately discuss it with their supervisor and escalate it if necessary. • Be careful not to permit management to override established procedures. • Any requested change in procedure should be verified by back-up checks. In Case 1 above a simple telephone call to the supplier would have revealed the scam. Check email addresses behind email names. • Follow up on all concerns, reports and audit recommendations. • If in doubt - check. Management must make it clear (by regular communication, not just by a well written whistle-blowing policy) that any employee with a concern should report it. If it turns out to be misplaced, a report in good faith will nevertheless be appreciated and commended. • Perhaps one of the most important features that can reduce the chance of fraud occurring is the culture of an organisation. Where management makes it clear that inappropriate behaviour of any kind is not acceptable, that even seemingly trivial misdemeanours are dealt with firmly and management leads by example, a culture of zero-tolerance can develop in which fraudulent conduct is less likely to arise and more likely to be detected early. This practical guide is designed to help businesses consider some of the basic procedures that have been proven to reduce the incidence of fraud. If a fraud is discovered it will help you conduct investigations into fraud in the workplace at short notice, often under pressure. It will alert you to some of the key problems you may face in conducting investigations and provides a straightforward guide to help you navigate through some of the areas where problems are most likely to arise. Andrew Keltie Joanna Ludlam Partner Partner Tel: +44 (0) 207 919 1376 Tel: +44 (0) 207 919 1822 Email: andrew.keltie@ Email: joanna.ludlam@ bakermckenzie.com bakermckenzie.com Preventing and investigating fraud in the workplace | 5 How can CORPORATE GOVERNANCE help prevent fraud? Fraud by a company’s management or employees, or their involvement in criminal or unethical activities either against the company or on behalf of the company, is likely to result in the company incurring financial losses and reputational damage. Losses may arise from funds lost directly as a result of a fraud or from the costs of internal and external investigations into improper conduct. Good corporate governance can reduce the risk of fraud at every level within a company. 6 | Preventing and investigating fraud in the workplace What is corporate governance? How can The phrase “corporate governance” can be used to describe the internal policies, processes and people, which serve the Good corporate needs of shareholders and other stakeholders, by directing governance can and controlling management activities with objectivity, “ provide companies accountability and integrity. The term encompasses principles such as transparency and accountability but in the broadest with the tools to sense, it is the way in which a company is run. In other words, prevent fraudulent corporate governance means rigorous supervision of the management of a company; it means ensuring that business practices. is done competently, with integrity and with due regard for the interests of all stakeholders. Good corporate governance is embodied in practices such help prevent fraud? as quick and accurate reporting of quality information, the establishment of clear, credible and well-documented ” decision-making and review processes, and effective two-way communication with shareholders and other stakeholders. Good governance is, therefore, a mixture of legislation, non- legislative codes, self-regulation and best practice, structure, culture, and board competency. Good corporate governance can provide companies with the tools to prevent, as well as identify, potentially fraudulent, or other criminal and unethical activities and business practices. In general, the nature of the arrangements that a company should have in place will depend on its size, the nature of its business, the jurisdictions in which it operates and the associated risks that it faces. Using corporate governance rules and standards to help prevent fraud The Combined Code Much of governance goes beyond the legal framework. Company law deals at length with the individual and collective responsibilities of directors, but contains few references to processes, quality standards or outcomes. In the UK there is a system of self-regulation. The Combined Code on Corporate Governance, published by the Financial Reporting Council (FRC), the independent regulator for promoting confidence in corporate reporting
Recommended publications
  • Cumulative Index (Volumes 1-20)
    Campbell Law Review Volume 20 Article 7 Issue 2 Spring 1998 February 2012 Cumulative Index (Volumes 1-20) Follow this and additional works at: http://scholarship.law.campbell.edu/clr Recommended Citation Cumulative Index (Volumes 1-20), 20 Campbell L. Rev. 497 (1998). This Index is brought to you for free and open access by Scholarly Repository @ Campbell University School of Law. It has been accepted for inclusion in Campbell Law Review by an authorized administrator of Scholarly Repository @ Campbell University School of Law. et al.: Cumulative Index (Volumes 1-20) INDEX BY VOLUME Volume 1 Prior Crimes as Evidence in Present Criminal Trials ................... 1:1 Charles W. Gamble In Praise of Pension Reform .......................................... 1:31 Ronald I. Kirschbaum A History of Liquor By-The-Drink Legislation in North Carolina ........ 1:61 Michael Crowell Statutory Standard of Care for North Carolina Health Care Providers... 1:111 John Marsh Tyson Separation Agreements: Effect of Resumed Marital Relations - Murphy v. M urphy ....................................................... 1:131 Donald R. Teeter Farmers as Merchants in North Carolina - Currituck Grain, Inc. v. Pow ell .......................................................... 1:141 Beverly Wheeler Massey The Effect of Unanimous Approval on Corporate Bylaws - Blount v. T aft ............................................................. 1:153 Margaret Person Currin North Carolina and Declarations Against Penal Interest - State v. H aywood ........................................................ 1:161 Samuel W. Meekins Confronting Accused With Evidence Against Him as "Interrogation" Within the Meaning of Miranda - State v. McLean ................. 1:173 William M. Spivey Public Documents in the Hands of Private Collectors - State v. West .... 1:179 Samuel R. Clawson Volume 2 Advisory Rulings by Administrative Agencies: Their Benefits and D angers ........................................................
    [Show full text]
  • Breach of Confidence - the Eedn for a New Tort - Watts V
    Campbell Law Review Volume 8 Article 6 Issue 1 Winter 1985 January 1985 Breach of Confidence - The eedN for a New Tort - Watts v. Cumberland County Hospital System Kathryn B. Remick Follow this and additional works at: http://scholarship.law.campbell.edu/clr Part of the Evidence Commons, and the Legal Ethics and Professional Responsibility Commons Recommended Citation Kathryn B. Remick, Breach of Confidence - The Need for a New Tort - Watts .v Cumberland County Hospital System, 8 Campbell L. Rev. 145 (1985). This Note is brought to you for free and open access by Scholarly Repository @ Campbell University School of Law. It has been accepted for inclusion in Campbell Law Review by an authorized administrator of Scholarly Repository @ Campbell University School of Law. Remick: Breach of Confidence - The Need for a New Tort - Watts v. Cumberl BREACH OF CONFIDENCE-THE NEED FOR A NEW TORT-Watts v. Cumberland County Hospital System. INTRODUCTION When a patient divulges embarrassing, intimate, or even in- criminating information to a therapist he or she usually expects that such disclosures will be kept completely confidential. A wrongful disclosure by a therapist potentially injures a patient in two distinct ways.' First, the patient is injured by the adverse ef- fects flowing from the wrongful disclosure' and second, the wrong- ful disclosure destroys the patient's expectation that communica- tions will be kept confidential.' Since confidentiality is vital to the adequate functioning of a patient-therapist relationship, the legal protection of these confidences is necessary to promote a relation- ship that is beneficial to society. The North Carolina Court of Appeals in Watts v.
    [Show full text]
  • Table of Contents
    TABLE OF CONTENTS VOLUME 1 Preface .................................................... v Table of Contents ............................................ C-1 Contents Checklist........................................... CL-1 Table of Cases ............................................. TC-1 PART 1 Ð INTRODUCTION Chapter 1 Introduction ........................................1-1 1:10 Introduction . 1-1 1:20 Historical Antecedents of the Employment Relationship . 1-2 PART 2 Ð CONSTITUTIONAL JURISDICTION Chapter 2 Constitutional Jurisdiction..............................2-1 2:10 Antecedents and General Framework . 2-1 2:20 Multi-Undertaking Employers . 2-6 2:30 Concurrency . 2-7 2:40 Federal Spending . 2-8 2:50 Non-use of Constitutional Authority. 2-9 2:60 Corporate Identity . 2-9 2:70 Workers' Compensation and Occupational Health Schemes . 2-9 2:80 Human Rights . 2-10 2:90 Integral . 2-10 2:100 Transportation . 2-14 2:110 Telecommunications . 2-16 2:120 Aeronautics . 2-18 2:130 Aboriginal Peoples . 2-19 2:140 Banking. 2-21 2:150 Emergencies . 2-22 2:160 Declaration . 2-22 2:170 Federal Territory . 2-23 C-1 November 2015 CANADIAN EMPLOYMENT LAW 2:180 Federal Public Sector and Crown Corporations . 2-23 2:190 Charter Remedy . 2-23 PART 3 Ð PRIMARY COMPONENTS OF THE RELATIONSHIP Chapter 3 Employer and Employee Status . 3-1 3:10 The Existence of the Relationship . 3-1 3:10.1 The ªMaster and Servantº Relationship . 3-1 3:10.2 Control . 3-6 3:10.3 Fourfold Test . 3-8 3:10.4 Entrepreneur Test . 3-9 3:10.5 Organization Test . 3-11 3:10.6 Assignment of Employment Contracts . 3-13 3:20 Employee and Employer Status .
    [Show full text]
  • 12. Breach of Confidence Actions for Misuse of Private Information
    12. Breach of confidence actions for misuse of private information Contents Summary 179 The likely future development of the action for breach of confidence 180 Damages for emotional distress in action for breach of confidence 181 Injunctions, privacy and the public interest 185 Injunctions in defamation and breach of confidence 188 Injunctions to restrain disclosure of private information 190 Summary 12.1 This chapter makes two proposals dealing with existing protections of privacy at common law and with a view to the likely development of the common law if a statutory cause of action is not enacted.1 12.2 In addition to and separate from the detailed legal design of a statutory cause of action for serious invasion of privacy, the Terms of Reference require the ALRC to make recommendations as to other legal remedies to redress serious invasions of privacy and as to innovative ways in which the law may reduce serious invasions of privacy. 12.3 The Terms of Reference also direct the ALRC to make recommendations as to the necessity of balancing the value of privacy with other fundamental values including freedom of expression and open justice. 12.4 The first proposal is intended to redress uncertainty in the community as to whether Australian law provides a remedy for emotional distress suffered as a result of a breach of privacy which takes the form of the disclosure or misuse of private 1 In this chapter, the ALRC does not consider the possible development at common law of a new or separate tort for harassment or intrusion into seclusion, because it considers that, in the absence of a statutory cause of action for serious invasion of privacy, a statutory action for protection against harassment is the more appropriate way for the law to be developed: see Ch 14.
    [Show full text]
  • The New Law of Ideas
    Harvard Journal of Law & Technology Volume 28, Number 1 Fall 2014 THE NEW LAW OF IDEAS Robert C. Denicola* TABLE OF CONTENTS I. INTRODUCTION .............................................................................. 195 II. IDEAS AS TRADE SECRETS ........................................................... 198 A. Trade Secrets and Ideas ........................................................... 198 B. Idea Protection Under the UTSA ............................................. 201 III. DISPLACEMENT UNDER THE UTSA ............................................ 204 A. Alternative Causes of Action To Protect Ideas ......................... 205 B. Ideas That Do Not Qualify as Trade Secrets ............................ 215 IV. SUBSTANTIVE STANDARDS FOR IDEA PROTECTION ................... 218 V. FEDERAL PREEMPTION OF NON-CONTRACTUAL IDEA CLAIMS ......................................................................................... 220 A. Preemption by Federal Patent Law .......................................... 221 B. Preemption by Federal Copyright Law .................................... 223 VI. CONTRACTUAL PROTECTION OF IDEAS ...................................... 225 A. Express and Implied-in-Fact Contracts ................................... 226 B. Federal Preemption of Contractual Idea Protection ............... 230 1. Federal Patent Law ................................................................ 231 2. Federal Copyright Law .......................................................... 233 VII. CONCLUSIONS ..........................................................................
    [Show full text]
  • Restatement of the Law of Torts, Volume Iv: a Comparison Between American and English Law *
    March, X943 University of Pennsylvania Law Review And American Law Register FOUNDED 1852 Copyright 1943, by the University of Pennsylvania VOL. 91 MARCH, 1943 NUMBER 6 RESTATEMENT OF THE LAW OF TORTS, VOLUME IV: A COMPARISON BETWEEN AMERICAN AND ENGLISH LAW * ARTHUR L. GODHART t Volume IV of the Restatement of the Law of Torts is perhaps the most interesting of the Restatements, for it is concerned with such controversial topics as interference with business relations, private nui- sance, interference with privacy, and damages. It is also of particular interest from the standpoint of comparative law as the differences be- tween English and American law seem to be more marked here than they are in the other branches of the law of torts dealt with in previous volumes. This may be more apparent than real, due to the fact that the American Law Institute, having gained confidence with experience, seems to have stated doubtful rules in a more categorical fashion than was its earlier practice. Thus, for example, Section 867, which deals with "interference with privacy", is far more absolute on this point than are most of the other American authorities on the law of tort. INTERFERENCE WITH BUSINESS RELATIONS Volume IV begins with a chapter on the miscellaneous trade prac- tices which are condemned by the American law. These rules are con- siderably more stringent than are the corresponding ones in England, but it is doubtful whether in practice American commercial morality * This article concludes a series of articles by Professor Goodhart on Volumes one, two and three of the Restatement.
    [Show full text]
  • The Law of Torts
    ______________________________________________________________________________ THE LAW OF TORTS ______________________________________________________________________________ NCA Syllabus by: Nicholas Fernandes (Updated 2021) - 2 - TERMS OF USE Copyright © 2020 Law of Torts by Nicholas Fernandes. All rights reserved. No part of these notes may be reproduced or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, or stored in any retrieval system of any nature, without the prior written permission of the copyright holder. By signing up for the Law of Torts classes hosted by Nicholas Fernandes, you agree to abide by the terms contained herein, failing which, the copyright holder would be entitled pursue enforcement of his rights, which can include the launching of a formal complaint with the relevant Provincial administrative body. These materials are produced for the sole purpose of self-study in preparation for the NCA Law of Torts Examination and should not be used for any other purpose. The copyright holder does not accept liability for, and makes no warranties in regards to, any use made of these materials beyond their stated purpose. NCA candidates are only permitted to reproduce these materials for their personal use in examination preparation. The copyright holder makes his best efforts to ensure that these materials are accurate and current as of January, 2020. These materials are based on and include text from Robert M Solomon, Mitchell McInnes, Erika Chamberlain and Stephen GA Pitel, Cases and Materials on the Law of Torts, 10th ed (Toronto, ON: Carswell, 2019); and, GHL Fridman, Introduction to the Canadian Law of Torts, 3rd ed (Lexis-Nexis, 2012). The majority of case law and legislative resources needed by NCA candidates are available on CanLII, the free legal information resource funded by the Federation of Law Societies of Canada (www.canlii.org).
    [Show full text]
  • Freedom of Expression, Breach of Confidence and American Cyanamid
    Freedom of Expression, Breach of Confidence and American Cyanamid Stephen M Hunter* 1: INTRODUCTION From October 1992 until June 1994, a company named European Pacific used the New Zealand courts to shield its misdeeds from the glare of publicity, or as one of their lawyers called it, "prurient public inquisitiveness".' The principal legal means used to achieve this was the action for breach of confidence. The most important defence to this action, the public interest defence, was of little consequence. The cases surrounding the Winebox documents are the most significant and interesting on confidence in New Zealand for some years.' The Winebox documents contain evidence of large-scale circumvention of New Zealand tax law by some of this country's largest companies. The public interest in the documents is widely acknowledged. 3 Despite this, the owners of the documents, the European Pacific Group, were able to use actions for breach of confidence to prevent disclosure of the documents for over eighteen months. Part II of this article concentrates on the present state of the public interest defence to the action for breach of confidence. There will be discussion of its history, role and operation. Of particular importance isthe manner in which the defence operates at the interlocutory stage, as discussed in Part III. Part IV analyses how the courts decide whether or not to apply the defence when they have not had the benefit of hearing the full facts at trial. Parts V and VI discuss the operation and the adequacy of the defence in litigation relating to the Winebox documents.
    [Show full text]
  • Bibliography
    345 Bibliography Alexander (1972) 'The Law of Tort and Non-Physical Loss: Insurance Aspects', 12 JSPTL 119. Allen et al. (1979) Accident Compensation after Pearson (Sweet & Maxwell). Anderson (1994) in Markesinas & Deakin, Tort Law. Atiyah (1967) Vicarious Liability in the Law of Torts (Sweet & Maxwell). Atiyah (1972) 'Res Ipsa Loquitur in England and Australia', 35 MLR 337. Atiyah (1989) An Introduction to the Law of Contract, 4th edn (Oxford University Press). Baker (1990) An Introduction to English Legal History, 3rd edn (Butterworths). Baker and Milsom (1986) Sources of English Legal History (Butterworths). Bell (1983) Policy Arguments in Judicial Decisions (Oxford University Press). Beyleveld and Brownsword (1991) 'Privity, Transivity and Rationality', 54 MLR48. Birks (1985) An Introduction to the Law of Restitution (Oxford University Press). Birks (1991), 'Civil Wrongs: A New World', Butterworths Lectures 1990-91. Bishop (1980) 'Negligent Misrepresentation through Economists' Eyes', 96 LQR 360. Bishop (1982) 'Economic Loss in Tort', 2 OJLS 1. Bowman and Bailey (1986) 'The Policy Operational Dichotomy - A Cuckoo in the Nest', 45 CLJ 430. Buckley (1996) The Law of Nuisance, 2nd edn (Butterworths). Burrows (1994) Remedies for Torts and Breach of Contract, 2nd edn (Butter- worths) Burrows (1993), 'The Scope of Exemplary Damages', 109 LQR 358. Calabresi (1970) The Costs of Accidents (New Haven, CT). Calcutt (1990) Report on Privacy and Related Matters (HMSO), Cmnd 1102. Calcutt (1993) Review of Press Self-Regulation (HMSO), Cm 2135. Cane (1989) 'Economic Loss in Tort: Is the Pendulum out of Control', 52 MLR 200. Cane (1996) Tort Law and Economic Interests, 2nd edn (Oxford University Press). Cane (1993) Atiyah's Accidents, Compensation and the Law, 5th edn (Butter­ worths).
    [Show full text]
  • “In Confidence” – Putting in Place a Trade Secret Protection Program
    “In Confidence” – Putting in Place a Trade Secret Protection Program Training of the Trainers Program on Effective Intellectual Property Asset Management by Small and Medium Sized Enterprises (SMEs) WIPO & IPOM, Mongolia Ulaanbaatar, October 8 to 10, 2013 Susanna H.S. LEONG Associate Professor & Vice Dean NUS Business School, National University of Singapore Protection of Trade Secrets - TRIPS • In TRIPS, the obligation of member states to provide protection for confidential or undisclosed information is found in article 39 which provides: • (1) In the course of ensuring effective protection against unfair competition as provided in Article 10bis of the Paris Convention (1967), members shall protect undisclosed information in accordance with paragraph 2 and data submitted to governments or governmental agencies in accordance with paragraph 3. • (2) Natural and legal persons shall have the possibility of preventing information lawfully within their control from being disclosed to, acquired by, or used by others without their consent in a manner contrary to honest commercial practices so long as such information: – (a) is secret in the sense that it is not, as a body or in the precise configuration and assembly of its components, generally known among or readily accessible to persons within the circles that normally deal with the kind of information in question; – (b) has commercial value because it is secret; and – (c) has been subject to reasonable steps under the circumstances, by the person lawfully in control of the information, to keep it secret. [emphasis added] Protection of Confidential Information under Common Law • At common law, a plaintiff who alleges a breach of confidence must establish all of the following: • (a) the information must have the necessary quality of confidence about it; • (b) the information must have been imparted in circumstances importing an obligation of confidence; and • (c) there must have been an unauthorised use of that information to the detriment of the party communicating it.
    [Show full text]
  • Divulging Secrets and Other Breaches of Confidence
    Legal Link Marvin Joel Huberman Divulging Secrets and Other Breaches of Confidence “A secret spoken finds wings.” ---Robert Jordan, The Path of Daggers We – individuals, corporations and governments – all have communicated the information in confidence; that the secrets. Some are of tremendous value; others less so. Some information was misused by the defendant and that the are complex; others are simple. defendant suffered loss or detriment as a consequence of the breach. The plaintiff must also plead with particularity, Broadly speaking, it is wrong to divulge – to spread among the among other things, the relationship in which the confidence multitude – a secret. By definition, a secret is “something that arose and the damages resulting from the breach. is kept or meant to be kept unknown or unseen by others”. And while there are exceptional circumstances which may The test to determine whether the information was conveyed justify or even compel the disclosure of the secret, protecting in confidence is if the circumstances are such that any the confidential information and honouring the relationship of reasonable person standing in the shoes of the recipient of the trust and the expectation that the information conveyed will be information would have realized that on reasonable grounds kept private and confidential are often the paramount the information was given to him or her in confidence. This consideration. determination requires an analysis of the specific context and facts and circumstances of the given case presented. It is not Sometimes revealing something communicated in confidence necessary that the confidential information be disclosed to a is not only morally or professionally wrong, it is also third party.
    [Show full text]
  • The Economic Torts and English Law: an Uncertain Future
    Kentucky Law Journal Volume 95 | Issue 4 Article 3 2007 The conomicE Torts and English Law: An Uncertain Future Hazel Carty Manchester University Follow this and additional works at: https://uknowledge.uky.edu/klj Part of the Common Law Commons, and the Torts Commons Right click to open a feedback form in a new tab to let us know how this document benefits you. Recommended Citation Carty, Hazel (2007) "The cE onomic Torts and English Law: An Uncertain Future," Kentucky Law Journal: Vol. 95 : Iss. 4 , Article 3. Available at: https://uknowledge.uky.edu/klj/vol95/iss4/3 This Symposium Article is brought to you for free and open access by the Law Journals at UKnowledge. It has been accepted for inclusion in Kentucky Law Journal by an authorized editor of UKnowledge. For more information, please contact [email protected]. ARTICLES The Economic Torts and English Law: An Uncertain Future Hazel Carty' I. INTRODUCTION A. The Economic Torts Outlined There is no over-arching tort of unfair competition or misappropriation in English common law. Rather, when excessive competitive practices are al- leged, the aggrieved party must identify a specific tort (or torts) that cover the harm done to them. The causes of action most appropriate where unfair trading is the issue are the so-called "economic torts."' These causes of action comprise the torts of simple conspiracy, unlawful conspiracy, induc- ing breach of contract, intimidation, unlawful interference with trade, and malicious falsehoodA The list also includes the important tort of passing off which, unlike the others, is not a tort of intention.
    [Show full text]