Fraud Examination FOURTH EDITION W. STEVE ALBRE HT CHAD. ALBRE'CHI COSNSA \1 C. ALBRECHT- MARK F. ZIMBELEVSAW. SOUTH-WESTERN CENGAGE Learning-
|
|
- Kimberly Norris
- 8 years ago
- Views:
Transcription
1 Fraud Examination FOURTH EDITION W. STEVE ALBRE HT Brigham Young University CHAD. ALBRE'CHI Utah State University COSNSA \1 C. ALBRECHT- Brigham Young University MARK F. ZIMBELEVSAW Brigham Young University SOUTH-WESTERN CENGAGE Learning- Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States
2 Contents About the Authors Foreword Preface PART 1 Introduction to Fraud xii xv.xvii CHAPTER 1 The Nature of Fraud 3 Seriousness of the Fraud Problem 4 What Is Fraud? 6 Fraud, Greed, Deception, and Confidence 8 Types of Fraud 9 Employee Embezzlement 10 Vendor Fraud 11 Customer Fraud 11 Management Fraud 11 Investment Scams and Other Consumer Frauds 12 Criminal and Civil Prosecution of Fraud 13. Criminal Law 14., Civil Law 15 - How to Prepare to Be a Fraud-Fighting Professional 16 Certified Fraud Examiners 17 Academic Requirements 17». v Professional Requirements 17 "* ** ' Fraud-Related Careers 17 Review of the Learning Objectives 19 Key Terms 20 Questions 20 Short Cases 23 Case Studies 25 Internet Assignments 28 Debates 28 End Notes 28 CHAPTER 2 Why People Commit Fraud. Who Commits Fraud 33 The Fraud Triangle 34 The Element of Pressure 36 Financial Pressures 36 Vice Pressures Work-Related Pressures 38 >7- " Other Pressures 38,,; The Element of Opportunity 39 Controls That Prevent and/or Detect Fraudulent Behavior 39. "...'.., "';......' '. '. " Summary of the Controls That Prevent or Detect Fraud 44 ',.', ' 'J ' \, ' ; 'y./.'tw}- ' ',,,, - Inability to Judge the Quality of Performance 45 Failure to Discipline Fraud Perpetrators 46 Lack of Access to Information ; 47;' ;, Ignorance, Apathy, and Incapacity 47; > Lack of an Audit Trail 48 ' ' "' )., ' " '"'.""''.' ' ' \ The Element of Rationalization 4? Summary of the Fraud Triangle 51 ; Fraud Recruitment,53!.'. -,./ -; ;';,', _, '-. y y y } P o w e r " "..'., ; ; - v ] ' ' ' Review of the Learning Objectives 55 ; K e y T e r m s 5 6,.- ' ".-;.; v'-,",-'.' ' ; ' '. '""'' Q u e s t i o n s 5 6 "'' '...' ' Short Cases 58 '. '.' " '. [.' ;,*.' -; Case Studies 63 Internet Assignment 65, % Debate 65 E n d N p t e s 6 5 '. " '.'.,,;.. '.'.' ; '. "; ';" '.'.. '..'.'.'., CHAPTER 3 Fighting Fraud An Overview ;'...'.'., Knowing Different Ways That Organizations Fight F r a u d 7 0 '... ' ' '.;'-'. -''- -', ; - - " ' " Fraud Prevention 71 Creating a Culture of Honesty and High Ethics 71 Assessing and Mitigating the Risk of Fraud 75 Fraud Detection 77, ' ^- "''' ' ' /."-'y.,','.; i [" ',''., Fraud Investigation 79 ; ; V ;, ; Approaches to Fraud Investigation 80',''. Conducting a Fraud Investigation 81, ', Follow-Up Legal Action 82!'. Civil Action' 83; '". * -; ''' "V ''- ; v. ;'-'.'.'\-,, Criminal Action 83 '""', -*,,, ;.'.,,-;,. Review of the Learning Objectives 84.." ; K e y T e r m s. 8 5 '. '. ' '".,,.'- f -;;. ' ]' '- Q u e s t i o n s 8 5 ' ' r '' ' '. /''".-."./,.; -. ' ; '. ]
3 vi Contents Short Cases 88 Case Studies 89 Internet Assignments 91 Debates 92 End Notes 92 APPENDIX A Red Hat Code of Business Conduct and Ethics 93 PART 2 Fraud Prevention CHAPTER 4 Preventing Fraud.101 Just About Everyone Can Be Dishonest 103 Creating a Culture of Honesty, Openness, and Assistance 103 Hiring Honest People and Providing Fraud Awareness Training 103 Creating a Positive Work Environment 106 Implementing Employee Assistance Programs (EAPs) 112 Eliminating Opportunities for Fraud to Occur 113 Having a Good System of Internal Controls 113 Discouraging Collusion between Employees and Others and Alerting Vendors and Contractors to Company Policies 116 Monitoring Employees and Having a Whistle-Blowing System 117 Creating an Expectation of Punishment 119 Conducting Proactive Fraud Auditing 119 Preventing Fraud A Summary 120 " A Comprehensive Approach to Fighting Fraud 120 Organizations and Fraud The Current Model 121 Review of the Learning Objectives 124 Key Terms 125 Questions 125 Short Cases 126 Case Studies 129 Internet Assignments 130 Debates 131 End Notes 131 PART 3 Fraud Detection CHAPTER 5 Recognizing the Symptoms of Fraud Symptoms of Fraud 137 Accounting Anomalies Irregularities in Source Documents 139 Faulty Journal Entries 140 Inaccuracies in Ledgers. 141^ ;..' Internal Control Weaknesses 143 L. Analytical Fraud Symptoms 144 Extravagant Lifestyles 148, Unusual Behaviors 149 Tips and Complaints 151 Company Employees Are in the Best Position to Detect Fraud 152 Tips and Complaints Are Fraud Symptoms 152 New Laws Protect Whistle-Blowers and Promote Fraud Detection 153 Review of the Learning Objectives 158 Key Terms 159 Questions 159 Short Cases 161 Case Studies 163 Internet Assignments 165 End Notes 165 CHAPTER 6 Data-Driven Fraud Detection Anomalies and Frauds 168 Audit Sampling and Fraud 169 The Data Analysis Process 169 Step 1 Understand the Business 169 Step 2 Identify Possible Frauds That Could Exist 170 Step 3 Catalog Possible Fraud Symptoms 171 ; '/ Step 4 Use Technology to Gather Data about " Symptoms 171 Step 5 Analyze Results 172 Step 6 Investigate Symptoms 172 Data Analysis Software 172 Data Access 173 Open Database Connectivity 173 Text Import 174. Hosting a Data Warehouse 174 Data Analysis Techniques 175 Data Preparation 175 Digital Analysis 175 Outlier Investigation 179., Stratification and Summarization 179 Time Trend Analysis 180 Fuzzy Matching 181 Real-Time Analysis 182 Analyzing Financial Statement Reports 183 Review of the Learning Objectives 190 Key Terms 190 -
4 , '., Contents vii Questions 191 Short Cases 193 Case Studies 196 ' Internet Assignments 202 Debates 202 End Notes 202 APPENDIX A Examples of the Data-Driven Approach 203 PART 4 Fraud Investigation CHAPTER 7 Investigating Theft Acts 209 When to Investigate 210 Theft Act Investigative Methods 212 Developing a Vulnerability Chart 213 Surveillance and Covert Operations 214 Invigilation 216 Physical Evidence 218. Electronic Evidence 218. Forensic Software Packages Systems 221 A Comprehensive Example of Using Theft Act Investigation Methods 2-22 Review of the Learning Objectives 224 Key Terms 224 Questions 225 Short Cases 226 Case Studies 229 Internet Assignments 230 Debates 230 End Notes 230 CHAPTER 8 Investigating Concealment Concealment Investigative Methods 233 Aspects of Documentary Evidence 233 Obtaining Documentary Evidence 237 Audits 237 Document Experts 242 Review of the Learning Objectives 246 Key Terms 246 Questions 246 Short Cases 248 Case Studies 249 Internet Assignments 250 Debates 250 End Notes 250 CHAPTER 9..,;;; ;'.. '- V,v,y,.'7.,-,', Conversion Investigation Methods;... I.. Conversion Searches 253 ' " ' ;.'.',' Government Sources of Information 254 Federal Sources 254 ",.',-,.. '- '.' State Sources of Information 255 County and Local Records 256 Private Sources of Information Online Databases 258, Internet Search 260 The Net Worth Method 261 Review of the Learning Objectives 263 Key Terms. 264.''. - '' ;;. V"-C'..' ' "...--V - Q u e s t i o n s ; ',',". " ' '. '. ''',- '.-'.-," Short Cases 266 ^ Case Studies ''270 '.'.. " ;..> ' ',- \ >' - ;';'' ; -. Internet Assignments ". ;, ; [ Debates 272.'^,;'; v, ; [" ',[' ; '," )' ' ^ -y. End Notes,273 '.v.,''. ''' -; ' y ->;V.v,.'-.;,. C H A P T E R TO '.,; ' ' -.", ' ' ;',;, -;;,- ',' ;,f Inquiry Methods and Fraud Reports, v...'... Interviewing An Overview 276 ' " ; Characteristics ofa Good Interview 276 Characteristics of a Good Interviewer 277 Understanding Reaction to Crisis 277 Stage 1. Denial 279.,-,. '.,, ;. '.' '[ Stage 2. Anger '.., -.-,, ' \ ' *,/ Stage 3. Bargaining and Rationalization 280 Stage 4. Depression 280; ".'.' Stage 5. Acceptance 280 /. Planning an Interview 280 ', The Interviewer's Demeanor 281 ''>.." The Language of Interviews 281 Question Typology 281 Elements of Conversation 282 Inhibitors of Communication 283 v. Facilitators of Communication 284 Mechanics of the Interview 285.,. Introductory Questions 285 Methodology. 286 ;*,,..;'... ;.; Informational Questions 288. Question Sequence 289 ; ' ' Informational Question Techniques 289 Note-Taking 289 "-,,, ;, iv,» ;./ ^; Observing Respondent Reactions 290 Theme Development 291- ' Transition Methodology 291' ;. Dealing with Resistance 292 V Difficult People 292. ; > ; Volatile Interviews 293 '..251 ;275
5 viii Contents * Assessment Questions 294 Detecting Deception 294 Methodology of Assessment Questions 296 Closing Questions 298 Admission-Seeking Questions 299 Steps in the Admission-Seeking Interview 300 Refute Alibis 303 Motive for the Fraud 305 Others Involved 306 Physical Evidence 306 Specifics of Each Offense 307 Signed Statements 307 Key Points in Signed Statements 308 Honesty Testing 308 Pencil-and-Paper Test 309 Graphology 309 Voice Stress Analysis and Polygraphs 309 The Fraud Report 309 Review of the Learning Objectives 310 Key Terms 311 ' Questions 311 Short Cases 313 Case Studies 316 Internet Assignments 318 Debates 318 End Notes 318 APPENDLX A Sample Signed Statement 319 APPENDIX B An Example Fraud Report 320 PART 5 Management Fraud CHAPTER 11 Financial Statement Fraud 357 The Problem of Financial Statement Fraud 359 Financial Statement Fraud in Recent Years 359 Why These Problems Occurred 360 Element 1 A Booming Economy 361 Element 2 Decay of Moral Values 361 Element 3 Misplaced Incentives 361 Element 4 High Analysts' Expectations 361 Element 5 High Debt Levels 362 Element 6 Focus on Accounting Rules Rather Than Principles 362 ' Element 7 Lack of Auditor -Independence 362 Element 8 Greed 363 Element 9 Educator Failures 363 Nature of Financial Statement Fraud 364 Financial Statement Fraud Statistics 364 Phar-Mor An Example of Financial Statement Fraud 366 ' Motivations for Financial Statement Fraud 367 A Framework for Detecting Financial Statement Fraud 368 Management and the Board of Directors 370 Managements' Backgrounds 370 Managements' Motivations 371 Managements' Influence in Making Decisions for the Organization 371 Relationships with Others 372 Relationship with Financial Institutions 373 Relationship with Related Organizations and Individuals 373 Relationship with Auditors 373 ; Relationship with Lawyers 374 Relationship with Investors 374 Relationship with Regulatory Bodies 374 Organization and Industry 376 Financial Results and Operating Characteristics 377 Review of the Learning Objectives 379 Key Terms 379 Questions 380 Short Cases 382 Case Studies 383 Internet Assignments 387 Debates 387 End Notes 388 APPENDIX A Recent Laws and Corporate Governance Changes Following the Sarbanes-Oxley Act 389 CHAPTER 12 Revenue- and Inventory-Related Financial Statement Frauds.399 Revenue-Related Fraud 400 Acceptable Alternatives 401 Ease of Manipulating Net Income Using Revenues and Receivables 401 Identifying Revenue-Related Fraud Exposures 402 Identifying Revenue-Related Fraud Symptoms 404 Actively Searching for Revenue-Related Fraud Symptoms 406 Actively Searching for Revenue-Related Analytical Symptoms 407 Actively Searching for Accounting or Documentary Symptoms 410 Actively Searching for Control Symptoms 411 Actively Searching for Behavioral or Verbal and Lifestyle Symptoms 412 Actively Searching for Tips and Complaints 413 Following Up on;revenue-related Fraud Symptoms 413
6 Contents ix Inventory and Cost of Goods Sold Frauds 414 Identifying Inventory-Related Fraud Exposures 415 Identifying Inventory-Related Fraud Symptoms 416 Proactively Looking for Inventory-Related Fraud Symptoms 418 Searching for Inventory and Cost of Goods Sold Analytical Symptoms 419 Actively Searching for Accounting or Documentary Symptoms 422 Actively Searching for Inventory-Related Control Symptoms 422 Actively Searching for Behavioral or Verbal and Lifestyle Symptoms 422 Actively Searching for Tips and Complaints 422 Review of the Learning Objectives 423 Key Terms 423 Questions 424 Short Cases 427 Case Studies^ 431 Internet Assignments 433 Debates 434 End Notes 434 APPENDIX A Strategic Reasoning and Detecting Revenue- and Inventory-Related Fraud 435 CHAPTER 13 liability, Asset, and Inadequate Disclosure Frauds. 445 Understating Liabilities 446 Ways to Manipulate Liabilities 447 Identifying Understatement of Liability; Fraud Exposures; 448 Understating Accounts Payable 448 Understating Accrued Liabilities 449 Recognizing Unearned Revenue (Liability) as Earned Revenue 450. Underrecording Future Obligations 450 Not Recording or Underrecording Various Types of Debt (Notes, Mortgages, etc.) 451 Omission of Contingent Liabilities 451 Detecting Understatement of Liability Fraud Symptoms 451 Analytical Symptoms 452 Accounting or Documentary Symptoms 452 Proactively Searching for Symptoms Related to the Underreporting of Liabilities 453 Focusing on Changes in Recorded Balances from Period to Period 453 Focusing on Changes in Relationships from Period to Period 454 Comparing Financial Statement Information with Other Companies 454 Comparing Financial Statement Amounts with Assets They Are Supposed to Represent or with Nonfinancial Statement Factors 456 Actively Searching for "Accounting and Documentary" Symptoms 456 Overstatement of Asset Fraud 456 Identifying Asset Overstatement Fraud 458 Improper Capitalization of Costs as Assets That Should Be Expensed in the Current Period 458 The Slippery Slope of Earnings Management 459 Inflated Assets through Mergers and Acquisitions (or Restructuring) or by Manipulating Intercompany Accounts and/or Transactions 459 Overstatement of Fixed Assets (Property, Plant, and Equipment) 462 Cash and Short-Term Investment Fraud 462 Overstatement of Accounts Receivable (Not Related to Revenue Recognition) or Inventory (Not Related to Cost of Goods Sold) 463 Summary of Overstatement of Asset Fraud, Exposures 463 ' Identifying and Actively Searching for Asset -v. Overstatement Fraud Symptoms 463 Inappropriately Capitalizing Costs That Should Be Expensed 464 Overstating Assets through Mergers, Acquisitions, or Restructurings or Manipulating Intercompany Accounts or Transactions 466 Overstatement of Cash and Short-Term Investments (Including Marketable Securities) 468 Overstatement of Receivables and/or Inventory (Not Revenue- or Cost of Goods Sold-Related) 469 Inadequate Disclosure Fraud 469 Kinds of Disclosure Fraud 470. Misrepresentations about the Nature of the Company or Its Products 470 Misrepresentations in MD&A and Other Nonfinancial Information in Financial Reports 471 Misleading Footnote Disclosures 471 Detecting Inadequate Disclosure Fraud 472 Symptoms Related to Overall Misrepresentation about the Company or Its Assets 473 Disclosure Fraud Related to Financial Reports and Financial Statement Footnotes 474 Other Types of Financial Statement Fraud 475 Inappropriate Accounting for Nonmonetary Transactions 475 Inappropriate Accounting for Roundtrip Transactions 475 Improper Accounting for Foreign Payments in Violation of the Foreign Corrupt Practices Act (FCPA) 476 Improper Use of Non-GAAP Financial Measures 476
7 x Contents Improper Use of Off-Balance-SheeJ; Arrangements Review of the Learning Objectives 477 Key T e r m s 478, '. " "} [ " ' ' ' Questions 478 -' '. ' ' - '. Short Cases 481 /,;;\'... ;...-,.-.,..,. Case Studies 485 ' "' '..'.,., Internet Assignments 488 ' ]' D e b a t e s ' ",..'. ' / ']'7" ',"-'*.'' E n d N o t e s 489 ; ; ;., ' y ' ',',.' ", v. ' APPENDIX A Strategic Reasoning and Detecting Liability, Asset, and Inadequate Disclosure ' -Frauds.;490'\,, ' ';'.- " "'- >'',', " ' PART 6 Other Types of Fraud 476 ' CHAPTER 14 Fraud against Organizations 503 Fraud Statistics 505, Asset Misappropriations 506,. Theft of Cash through Larceny 507 Theft of Cash through Skimming 508 Cash Theft thrbugh Fraudulent Disbursements 508. Theft of Inventory and Other Assets 514 '. Corruption 516 \ ' " ' '-. '*' ' ; B r i b e r y ' '..',. ** '''' ''"/ ' ;-,,' ' > - - Conflicts of Interest 518 ";' Economic Extortion and Illegal Gratuities 519 Review of the Learning Objectives 520 Key Terms' 520 '., ',,.' " '.. Questions 520,, 'Short Cases-.522-,. '. -' ' '.''-..'; ''-;';'/ Case Studies 525 Internet Assignments 526. Debates 526 ' "" "" '"' ' V,. ','' E n d Notes'' 526" v '-' ' " ' ' '."'", '"''.' ' ' CHAPTER 15 Consumer Fraud...,..vi...'.. Consumer Fraud and Its Seriousness 530 Identity Theft 531 f How Identity Theft Occurs 532 j How Fraudsters Convert Personal Information to Financial Gain 534 ;, Stealing a Victim's Identity 535. Minimizing the Risk 536 Prosecution of Identity Theft 539 Once Identity Theft Has Occurred 540 Identity Theft Concluding Comments Other Types of Consumer and Investment Scams 543 Foreign Advance-Fee Scams 543 Work-at-Home Schemes 545 '.'.'.. Bogus Mystery Shopping Scams 549 Telemarketing Fraud 549. Investment Scams 553. Review of the Learning Objectives 555 Key Terms 556 Questions 556 Short Cases 558 Cases Studies 560 Internet Assignments 562 Debates 562 End Notes 562 CHAPTER 16 Bankruptcy, Divorce, and Tax Fraud.565 Overview of Tax, Divorce, and Bankruptcy Frauds 566 Fraud Examiners' Roles in Bankruptcy and Divorce Cases 566 Tax Fraud 567 Fraud and the Criminal Investigation Division 568 CI Investigative Careers 571 Divorce Fraud 571 Participants in Divorce Cases 572.' ; Bankruptcy Fraud 572 The Bankruptcy Code 574 Civil and Criminal Bankruptcy Fraud Statutes 574 Civil Bankruptcy Statutes 575 Participants in the Bankruptcy Process 576 Fraud Investigator's Relationship to Participants in Bankruptcy Proceedings 578 ' Bankruptcy and Divorce Fraud Schemes The Planned Bankruptcy (Bust-Out) 579 Fraudulent Concealment of Assets or Income in Bankruptcies or Divorces 580 The Debtor's or Divorcee's Estate 580 Bankruptcy Statutes Concerning Concealment of Assets 580, Means of Concealing Assets or Income 581 Indicators of Concealment 581 Fraudulent Transfers 581 Civil Liability for False Accusations 582 Money Laundering 582 The Money Laundering Process 583 Efforts to Combat Money Laundering 583 Detecting Money Laundering Schemes 583 Review of the Learning Objectives 585 Key Terms 586 Questions 586 r
8 Contents id Short Cases 588 Case Studies 592 Internet Assignments 593 End Notes 593 APPENDIX A Affidavit of Proposed Investigator 594 APPENDIX B Application for Retention of Investigator 598 CHAPTER 17 Fraud in E-Commerce 601 Fraud Risks in E-Commerce 603 E-Commerce Risks Inside Organizations 603 E-Commerce Risks Outside Organizations 606 Preventing Fraud in E-Commerce 607 The Control Environment 608 Risk Assessment 609 Preventing Fraud through Control Activities 609 Detecting E-Business Fraud 611 Review of the Learning Objectives 612 Key Terms 612 Questions 612 Short Cases 614 Cases Studies 615, End Notes 617" ', - ^ PART 7 Resolution of Fraud CHAPTER 18 Legal Follow-Up. The Court System State Courts.622, '/- ' "'.y'']'y-'''. \'...< -', /, Federal Courts 623 *." ','"' "''"'"'..*.' ''.-".' -*. Civil and Criminal Fraud Trials ; ' \ Overview of the Civil Litigation Process 625 Investigation and Pleadings 625 ; < '< ', '. D i s c o v e r y 6 2 5,."., ' ;''7*7 [";-' '? ''.'. ".'.--.'. Settlement Negotiations.,627"'.,.'' f.';-.;'-\.- ',_' Trial and Appeal, 627, r... ' - /", - -'-.'.;'.'". ; ', ''' ; ; ; Overview of the Criminal Litigation Process 628 ; Filing Criminal Charges 628,...-,.', ' Arresting and Charging the Defendant 628, Preliminary Hearings 628 ; G r a n d Jury ' '.'. ' '-'- ""' ".' -.,' ' - '.' -.'.-- /. Arraignment 629,.,-... ' \[ ",*"' '" > "' D i s c o v e r y '.. -' ' ' ",',',.;' ; ' ', ; " ';; -.'.' Pretrial Motions 629, ; Trial and Appeal- 630.,',,7.';..' -, ; ;. ', -. ", 1 Being an Expert Witness 63T ; ; > y..., Review of the Learning Objectives 633 Key Terms ', ' ' ' ' ' ' ;.;,' ' -' \.'.'-. ';... Questions 634, - '-,..;-.' ;. ';', -.",. ; '; Short Cases ' " ;'..'."''" f,-..';; ; '.,.-,"'.'; ",-.''-.,. Case Studies.638 " -,; '.../} ( ' ;> '';^.';"''.'.",' " /;. I n t e r n e t A s s i g n m e n t s 6 3 9,. ;,,. D e b a t e s 640.,- ;," '.-;;./' 7';.. ',,-.. '.,;-,{*.'",.., - ' E n d N o t e s ' ' '. '" ','. \,.,.'; *" '-^.v'-."; ' ''-'.' Appendix Financial Statement Fraud Standards...' Bibliography ,>..v Glossary ;.;...,;.;...'.' Index.,...;,-..\...7..;...;...664
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
More informationDiploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
More informationThe Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
More informationCentre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
More informationINTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
More informationFraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
More informationINTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
More informationINTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON 240 THE AUDITOR S RESPONSIBILITIES RELATING TO (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
More informationTITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
More informationIntroductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal
More informationOffice of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
More informationFRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
More informationNINTH EDITION A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT
NINTH EDITION AUDITING A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT Kar la M. Johnstone University of Wisconsin Madison Audrey A. Gramling Bellarmine University Larry E. Rittenberg University of
More informationTypes of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
More informationA Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
More informationInternal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
More informationGLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
More informationChapter 15 Criminal Law and Procedures
Chapter 15 Criminal Law and Procedures Chapter Outline 1. Introduction 2. What Is a Crime? 3. Elements of Criminal Liability 4. Types of Crimes 5. Cyber Crime 6. Constitutional Safeguards 7. Criminal Procedures
More informationConsideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 1719 AU Section 316 Consideration of Fraud in a Financial Statement Audit (Supersedes SAS No. 82.) Source: SAS No. 99; SAS No. 113. Effective for audits
More informationFraud Policy FEBRUARY 2014
Fraud Policy FEBRUARY 2014 TABLE OF CONTENTS 1. Application of Policy... 2 2. Purpose of Policy... 2 3. Fraud Policy... 2 4. Definition of Fraud... 2 5. Duties and Responsibilities of an Employee or Contractor...
More informationSteven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
More informationModule # 2 Management/Key Employee Assessment
Module # 2 Management/Key Employee Assessment The management/key employee assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Internal
More informationDescriptions of Internships Available in the SEC s Divisions and Offices
Descriptions of Internships Available in the SEC s Divisions and Offices The SEC hires interns across the country into a variety of jobs. Below are descriptions of the different divisions and offices that
More informationWarning Signs and the Red Flag System
Fraud Prevention and Detection Warning Signs and the Red Flag System Rodney T. Stamler Hans J. Marschdorf Mario Possamai CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint
More informationHow To Handle A Fraud At Psc
FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent
More informationOffice of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs Second Edition American Recovery and Reinvestment
More informationThe auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
More information716 West Ave Austin, TX 78701-2727 USA
How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement
More informationSECURITIES EXAMINER (ENTRY) 5670
SECURITIES EXAMINER (ENTRY) 5670 GENERAL DESCRIPTION OF CLASS The SECURITIES EXAMINER (ENTRY), under the guidance of a Securities Examiner, analyzes and evaluates the activities of individuals and businesses
More informationREADING SCHOOL DISTRICT
No. 831 SECTION: OPERATIONS READING SCHOOL DISTRICT TITLE: WHISTLEBLOWER ADOPTED: April 23, 2008 REVISED: 831. WHISTLEBLOWER 1. Purpose The Reading School District is committed to facilitating open and
More informationFraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
More informationwww.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
More informationConsideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 151 AU-C Section 240 Consideration of Fraud in a Financial Statement Audit Source: SAS No. 122; SAS No. 128. Effective for audits of financial statements
More informationAuditing Standard ASA 240 The Auditor's Responsibilities Relating to Fraud in an Audit of a Financial Report
Compiled Auditing Standard ASA 240 (November 2013) Auditing Standard ASA 240 The Auditor's Responsibilities Relating to Fraud in an Audit of a Financial Report This compilation was prepared on 11 November
More informationFraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
More informationFraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
More informationFraud and Corruption Control
AS 8001 2003 Australian Standard Fraud and Corruption Control This Australian Standard was prepared by Committee MB-004, Business Governance. It was approved on behalf of the Council of Standards Australia
More informationAntifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
More informationFundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
More informationForensic Accounting: An Introduction
Forensic Accounting: An Introduction Forensic Accounting Forensic Accountants are part investigator, part auditor, part solicitor and part accountant. Forensic Accountants utilise an understanding of business
More information716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
More informationPioneer Power Solutions, Inc. Code of Business Conduct and Ethics
A. INTRODUCTION Pioneer Power Solutions, Inc. Code of Business Conduct and Ethics The purpose of this Code of Business Conduct and Ethics (this Code ) is to describe standards of conduct and business expected
More informationEthics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
More informationEducation and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students
NIJ Special Report Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NOTE: The following is based on an exposure
More informationLaw Related to Fraud. Bankruptcy (Insolvency) Fraud. 2015 Association of Certified Fraud Examiners, Inc.
Law Related to Fraud Bankruptcy (Insolvency) Fraud Bankruptcy Court Filed in a local district of the U.S. Bankruptcy Court Bankruptcy judges hear all cases involving: Debtors and creditors rights Approval
More informationHOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement
More informationMaking Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner tstrause@fosaudit.com 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
More informationAppendix A. Specific Learning Objectives by Course
Appendix A by Course MGMT 0630: Foundations in Ethics: Applications to Business and the CPA Profession Identify the regulatory bodies that regulate the CPA profession. Discuss the Code of Professional
More informationSAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
More informationA STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala
A STUDY ON FORENSIC ACCOUNTING AND ITS USABILITY By Jyotsana S. Agarwala Abstract: Forensic accounting is not a new field, but in recent years, banks, insurance companies and even police agencies have
More informationTechnical Professionals
THE ARC TRAINING GROUP A Division of The ARC Consulting Group, Inc. A Profit Enhancement Firm Providing Educational and Consultative Services to the International Business Community SEMINAR FACT SHEET
More informationEmployee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
More informationAsset Misappropriation Research White Paper for the Institute for Fraud Prevention
Asset Misappropriation Research White Paper for the Institute for Fraud Prevention by Chad Albrecht, Mary-Jo Kranacher & Steve Albrecht Abstract In this paper we provide a general overview of asset misappropriation.
More informationCFF Content Specification Outline
CFF Content Specification Outline The Pathway to the CFF Credential The American Institute of CPAs launched the Certified in Financial Forensic credential in June of 2008. The AICPA s CFF credential combines
More informationLeonard W. Vona, CPA, CFE
Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: lwvcfe@aol.com Part of an auditor s job is
More informationFraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
More informationCressey s fraud triangle: All 3 conditions must be present for fraud to occur
DEfINITION Of fraud AND fraud INvESTIgATION Dilek ÇİLİNgİR Ernst & Young What is fraud? According to International Standard on Auditing (240): An intentional act By one or more individuals among management,
More informationFRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives
FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial
More informationARCH CANOPY POLICY FOR NONPROFIT ORGANIZATIONS SM APPLICATION
ARCH CANOPY POLICY FOR NONPROFIT ORGANIZATIONS SM APPLICATION NOTICE: THE LIABILITY COVERAGE PARTS OF THIS POLICY PROVIDE CLAIMS MADE COVERAGE. EXCEPT AS OTHERWISE PROVIDED, SUCH COVERAGE APPLIES ONLY
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationINTRODUCTION TO FRAUD EXAMINATION
INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
More informationHow To Find Out If A Company Misstatement Is True
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 11 AUDITING INVENTORY, GOODS AND SERVICES, AND ACCOUNTS
More informationRED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
More informationFraud-Related Compliance
Fraud-Related Compliance R. A. (Andy) Wilson, CFE, CPP VP Fraud & Compliance Sedgwick Claims Management Services, Inc. Introduction: Why Compliance Is Essential 2015 Association of Certified Fraud Examiners,
More informationBefore beginning the study of how to conduct an audit, it is necessary to understand
Before beginning the study of how to conduct an audit, it is necessary to understand the overall objectives of the audit, the auditor s responsibilities in conducting the audit, and the specific objectives
More informationIPPF Practice Guide. Internal Auditing and Fraud
IPPF Practice Guide Internal Auditing and Fraud December 2009 IPPF Practice Guide Table of Contents Introduction... 1 Executive Summary... 2 Definition of Fraud... 4 Fraud Awareness... 5 A. Reasons for
More informationEXECUTIVE SUMMARY Compliance Program and False Claims Recovery
EXECUTIVE SUMMARY Compliance Program and False Claims Recovery INTRODUCTION: The Federal Deficit Reduction Act of 2005, also known as the DRA, requires that providers give their employees, medical staff,
More informationPiec ing together financ ial puzzles
Piec ing together financ ial puzzles Stephen Pedneault, CPA/CFF, FCPA, CFE Stephen Pedneault is the Principal of Forensic Accounting Services, LLC, a Glastonbury, Connecticut CPA firm, focused exclusively
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Cash Receipts 2016 Association of Certified Fraud Examiners, Inc. Fraud Tree 2016 Association of Certified Fraud Examiners, Inc. 2 of 27
More informationFraud, Waste and Abuse Prevention and Education Policy
Corporate Compliance Fraud, Waste and Abuse Prevention and Education Policy The Compliance Program at the Cortland Regional Medical Center (CRMC) demonstrates our commitment to uphold all federal and state
More informationHERITAGE FARM POLICY AND PROCEDURES. Policy: False Claims Act and Whistleblower Provisions
HERITAGE FARM POLICY AND PROCEDURES Policy: False Claims Act and Whistleblower Provisions Date: October 8, 2013 Rationale: It is Heritage Farm s intent to make sure all claims are submitted in a timely
More informationWhistleblower Case Study: Conducting Independent Internal Investigations. The Whistleblower. The Allegations 07/28/14
Whistleblower : Conducting Independent Internal Investigations Tracy L. Coenen, CPA, CFF tracy@sequenceinc.com The Whistleblower Accounting Manager Chronic poor job performance Letter to Board of Directors,
More information1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE
FRAUD RISK MANAGEMENT PROGRAM SHERYL VACCA SENIOR VICE PRESIDENT AND CHIEF COMPLIANCE AND AUDIT OFFICER MIKE JENSON UCR AUDIT DIRECTOR SESSION OBJECTIVE AND OUTLINE Assist campus managers in the development
More informationInternal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
More informationPreventing Fraud: What are the central securities depositories doing to mitigate this risk? Cancún, May 21, 2015
Preventing Fraud: What are the central securities depositories doing to mitigate this risk? Cancún, May 21, 2015 What is Fraud? Generally, fraud is described as a deliberate act of abuse of trust, taking
More informationFraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
More informationCOLLABORATIVE DIVORCE PARTICIPATION AGREEMENT CASE NAME:
APPENDIX A COLLABORATIVE DIVORCE PARTICIPATION AGREEMENT CASE NAME: I PLEDGE: We pledge to participate in good faith in this process for divorce with no court, minimal conflict and no coercion, but rather
More informationCash Flow Management: The Life of Your Business
Cash Flow Management: The Life of Your Business Brian S. Gottschalk CPA Partner GellerRagans Certified Public Accountants Advisors Cash Flow- defined Movement of money received and spent: the pattern of
More informationADMINISTRATIVE POLICY SECTION: CORPORATE COMPLIANCE Revised Date: 2/26/15 TITLE: FALSE CLAIMS ACT & WHISTLEBLOWER PROVISIONS
Corporate Compliance Plan AD-819-0 Reporting of Compliance Concerns & Non-retaliation AD-807-0 Compliance Training Policy CFC ADMINISTRATIVE POLICY AD-819-1 SECTION: CORPORATE COMPLIANCE Revised Date:
More informationSM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY
SM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY We at SM Energy Company are committed to compliance with applicable laws, rules and regulations and to conducting our business
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Accounting Concepts 2013 Association of Certified Fraud Examiners, Inc. Accounting Basics Assets = Liabilities + Owners Equity Accounting Basics By definition,
More informationTASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)
TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such
More informationMessage from the Co-Chairmen and Chief Executive Officers
Message from the Co-Chairmen and Chief Executive Officers As each of us works to meet individual and Company-wide business goals here at Torchmark, we must all ensure that the work we perform and the business
More informationOutdoor Retailer Conference Financial Statement Fraud. August 2, 2010 Derk G. Rasmussen. www.sagefa.com
Outdoor Retailer Conference Financial Statement Fraud August 2, 2010 Derk G. Rasmussen www.sagefa.com About Sage Forensic Accounting Sage Forensic Accounting quantifies damage claims in litigation, determines
More informationSecurities Whistleblower Incentives and Protection
Securities Whistleblower Incentives and Protection 15 USC 78u-6 (As added by P.L. 111-203.) 15 USC 78u-6 78u-6. Securities whistleblower incentives and protection (a) Definitions. In this section the following
More informationFraud-Related Compliance
Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments
More informationAFFIDAVIT OF JOHN P. KELLEHER. John P. Kelleher, being duly sworn upon oath, deposes and says:
STATE OF NEVADA ) ) ss: COUNTY OF CLARK ) AFFIDAVIT OF JOHN P. KELLEHER John P. Kelleher, being duly sworn upon oath, deposes and says: 1. I am an attorney licensed to practice law in the State of Nevada;
More informationIs There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
More informationContents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
More informationMOTORCAR PARTS OF AMERICA, INC. CODE OF BUSINESS CONDUCT AND ETHICS ADOPTED EFFECTIVE JANUARY 15, 2015
MOTORCAR PARTS OF AMERICA, INC. CODE OF BUSINESS CONDUCT AND ETHICS ADOPTED EFFECTIVE JANUARY 15, 2015 The Board of Directors of Motorcar Parts of America, Inc. ( MPA ) has adopted the following Code of
More informationAustralia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States
Accounting Information Systems SIXTH EDITION JAMES A. HALL Peter E. Bennett Chair in Business and Economics Lehigh University Australia Brazil Japan Korea Mexico Singapore Spain United Kingdom United States
More informationCompliance Plan False Claims Act & Whistleblower Provisions Purpose/Policy/Procedures
CATHOLIC CHARITIES OF THE ROMAN CATHOLIC DIOCESE OF SYRACUSE, NY and TOOMEY RESIDENTIAL AND COMMUNITY SERVICES Compliance Plan False Claims Act & Whistleblower Provisions Purpose/Policy/Procedures Purpose:
More informationCHAPTER 14: THE ROLE OF ACCOUNTANTS AND ACCOUNTING INFORMATION
CHAPTER 14: THE ROLE OF ACCOUNTANTS AND ACCOUNTING INFORMATION I. What Is Accounting and Who Uses Accounting Information? Accounting is a comprehensive system for collecting, analyzing, and communicating
More informationM E M O R A N D U M. The Policy provides for blackout periods during which you are prohibited from buying or selling Company securities.
M E M O R A N D U M TO: FROM: All Directors, Officers and Covered Persons of Power Solutions International, Inc. and its Subsidiaries Catherine Andrews General Counsel and Insider Trading Compliance Officer
More informationFORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011
FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 Presented by Gary J. Cassiello, CPA, ABV, CFF garyc@jgspc.com 845-692-9500 Today s Outline Why is Forensic Accounting important? Executive
More informationFraud Prevention & Detection
Fraud Prevention & Detection Dave Tate, CPA, Esq. http://davidtate.us tateatty@yahoo.com This discussion primarily pertains to financial statement fraud--that is, financial statements that contain intentionally,
More informationa. employees Company; or
Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged
More informationWHISTLEBLOWING POLICY NUS policies adopted and adapted by Yale-NUS College
WHISTLEBLOWING POLICY NUS policies adopted and adapted by Yale-NUS College Introduction 1. The University and Yale-NUS College (the College) are not-for-profit organizations that rely largely on public
More information