This investigation illustrated the risk that ‘back office’ staff with high levels of access to official information—for instance, through ‘privileged’ or ‘super user’ ICT access—may put themselves in a position where they could be subjected to corrupt compromise.

Investigation Report - Operation Helix Public Investigation Report - Operation Helix - 01.2015.pdf (184.07 KB)
See also