Integrity and Good Governance

i2CAT ensures transparency and accountability by implementing anti-fraud measures within the European framework.

Within the European framework established to manage Funds from the Recovery, Transformation and Resilience Plan, i2CAT implements a series of measures to combat fraud, provided for in national and local regulations.

These measures involve adopting an anti-fraud plan, launching an internal anti-fraud commission, and enabling internal and external communication channels to monitor potential conflicts of interest.

Implementing these measures aims to protect the financial interests of the European Union through the incorporation into the internal management and control sphere a series of specific principles, among which the reinforcement of mechanisms for prevention, detection, and correcting fraud, corruption and conflicts of interest.

Anti-Fraud Comission

Created to guarantee the correct application of anti-fraud measures associated with the management of the Recovery and Resilience Mechanism (RRM) funds, the i2CAT Anti-Fraud Commission is responsible for:

  • Periodic evaluation of the risk of fraud, ensuring effective internal control to prevent and detect possible fraud.
  • Defining and designing the necessary measures to prevent, detect, correct and follow fraud attempts.
  • Managing communications and complaints of fraud, conflicts of interest or other breaches of current regulations.
  • Preparing an annual report on the activities carried out by the Anti-Fraud Commission within the scope of its competence, which will be reported to the Management team.
  • Ordinarily, the Anti-Fraud Commission must meet at least every six months.

The i2CAT Foundation adopts a zero-tolerance policy for fraud and establishes a control system to prevent and detect fraudulent activity.

Ethical mailbox

This mailbox ensures the confidentiality of communications and protects whistleblowers at all times. Whistleblowers can choose to provide their identification and contact details or remain anonymous. There are two ways to make anonymous communications:

  • Use a browser without providing identifying or contact information. However, the IP address from which the communication is made can still be traced.
  • Using an anonymization network, including the IP address, ensures complete anonymity in the digital environment. The TOR network is the most commonly used tool for this purpose. Like any other browser, TOR must be downloaded from the appropriate website. Take a look at a tutorial video on downloading and using the TOR browser.

Experts and associations dedicated to citizen reports recommend offering this anonymization option to protect the integrity of whistleblowers, who are often in vulnerable situations.