Feeds

Michael Dell 'not involved' in accounting fraud

Buck, what buck? Must have passed it along...

Build a business case: developing custom apps

Michael Dell, CEO of Dell Computers said Wednesday he was not involved in any of the accounting monkeyshines uncovered during an internal probe at the company.

Dell's remarks at the Citigroup technology conference in New York is the first time he has publicly commented on his participation — or lack of participation — in the financial scandal.

"I was not involved in or aware of any of the accounting irregularities," Michael Dell told investors at the conference. "Certainly I'm not proud of what occurred at our company, but I am proud of the company overall, and I take responsibility for making sure those issues are addressed."

The investigation, spurred by the US Securities and Exchange Commission's (SEC) recent war on Silicon Valley backdating, found that account balances were fixed to show quarterly performance objects had been met. This was revealed to be sometimes done at the request or with the knowledge of senior executives.

The company has yet to restate its revised financial results for the time in question (2003-2006), but total income is expected to be reduced by about $150m. The financial book-cooking occurred in years during which Dell was CEO, when he handed the spot to Kevin Rollins in 2004, and when Dell reclaimed the position in February of this year.

So will the corporate self-hand washing properly appease the feds? The SEC is still investigating Dell's accounting issues, but has yet to take any action against the company.

"What you have now at Dell is really a new team that is addressing all of the issues that were raised in the investigation," Dell said.

The company said it has since sacked, reassigned or reprimanded those involved — although they won't say who the executives are, and if they are still working for the company.

As previously seen at Apple, the blameless CEO arises — a virginal figurehead perched upon the prow of a blood-soaked pirate ship. Its eyes on the clear blue vastness ahead, cleanhanded and unawares of the skullduggery committed within its hull.

So we're waxing metaphorically, but it's hard not to when everyone paints such a pretty picture. ®

The essential guide to IT transformation

More from The Register

next story
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
End of buttons? Apple looks to patent animating iPhone sidewalls
Filing suggests handset with display strips
One step closer to ROBOT BUTLERS: Dyson flashes vid of VACUUM SUCKER bot
Latest cleaner available for world+dog in September
Samsung Gear S: Quick, LAUNCH IT – before Apple straps on iWatch
Full specs for wrist-mounted device here ... but who'll buy it?
Apple promises to lift Curse of the Drained iPhone 5 Battery
Have you tried turning it off and...? Never mind, here's a replacement
Now that's FIRE WIRE: HP recalls 6 MILLION burn-risk laptop cables
Right in the middle of Burning Mains Man week
Apple's iWatch? They cannae do it ... they don't have the POWER
Analyst predicts fanbois will have to wait until next year
Tim Cook in Applerexia fears: New MacBook THINNER THAN EVER
'Supply chain sources' give up the goss on new iLappy
Reg man looks through a Glass, darkly: Google's toy ploy or killer tech specs?
Tip: Put the shades on and you'll look less of a spanner
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.