Contract and Procurement Fraud. Vendor Management
|
|
- Elizabeth Wiggins
- 7 years ago
- Views:
Transcription
1 Contract and Procurement Fraud Vendor Management
2 Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring vendors are legitimate (avoiding shell company schemes) 2 of 28
3 Vendor Due Diligence Controls for vendor master file management Vendor background checks Vendor questionnaires Vendor due diligence checklists Vendor monitoring Compliance committees to oversee the retention of any vendors Watchlists 3 of 28
4 Controls for Vendor Master File Management Set procedures for setting up new vendors and changing vendor master file records. Prevent employees responsible for the vendor master file from approving invoices or signing checks. Establish clear vendor master file naming conventions. Keep vendor records accurate and up-to-date. Monitor the application of the accounts payable policies on vendor master files. 4 of 28
5 Vendor Background Checks Review watchlists. Conduct a corporate registry search. Search politically exposed persons (PEP) databases. Verify the vendor s key individuals. Verify vendor s insurance. Verify any professional licenses. 5 of 28
6 Vendor Background Checks Confirm physical addresses. Perform site visits. Test the reputation of the vendor and its key individuals. Conduct a media analysis. Compare vendor addresses against employee addresses. 6 of 28
7 Vendor Background Checks Conduct interviews. Require W-9 forms before paying vendors. Review the vendor s policies and procedures on fraud, governance, and compliance. Review the vendor s financial data. Review the vendor s banking information. 7 of 28
8 Vendor Questionnaires Management should consider giving potential vendors a questionnaire requesting various types of information. The questionnaires should be written for each company s specific needs. 8 of 28
9 Vendor Due Diligence Checklist To help ensure that the vendor due diligence process is conducted in a refined fashion, purchasing companies should develop and use a vendor due diligence checklist. 9 of 28
10 Vendor Monitoring Use monitoring and auditing systems to detect criminal conduct by vendors. Base monitoring systems on the red flags of vendor schemes that pose the greatest risk. 10 of 28
11 Compliance Committee Establish a compliance committee to review and record actions and contracts relating to the retention of any vendors. 11 of 28
12 Watchlists Excluded Parties List System (EPLS) OFAC s List of Specially Designated Nationals and Blocked Persons List The Denied Persons List The Debarred Party List Nonproliferation Sanctions Lists The Export Administration Regulation (EAR) Entity List 12 of 28
13 Managing Vendor Risks Via Contracts Considerations in vendor contracts: Compliance with the law Professional standards Indemnification clauses Insurance Limits on liability Conflicts of interest Contract default, termination, and renewal A right to audit 13 of 28
14 Risk of Shell Companies Part of vendor management involves ensuring vendors are legitimate business enterprises. A shell company is a company that has no physical presence and generates little independent economic value. 14 of 28
15 Shell Company Schemes Involve the issuance of false invoices for products and services never delivered or rendered Perpetrated by vendors or employees Three-part process: Setting up the shell company Submitting an invoice Obtaining payment approval for the fraudulent invoice 15 of 28
16 Preventing Shell Company Schemes Segregate the duties of: Authorizing purchases Confirming purchases Authorizing payment Require purchase orders for payment. Create an approved vendor list and prohibit payment of invoices to any company not on the list. 16 of 28
17 Preventing Shell Company Schemes Have prospective vendors fill out a vendor data form. Verify the authenticity of contractors before making payments. Segregate duties of approving payments and adding/deleting names on the approved vendor list. Periodically compare budgeted expenses with actual expenses. 17 of 28
18 Preventing Shell Company Schemes Compare vendor addresses with employee addresses. Track unusual invoicing patterns. Train personnel to be alert to the red flags of fraudulent invoices. Prohibit use of vendors that do not have a physical address. 18 of 28
19 Red Flags of Shell Company Schemes Payments to contractors not on approved vendor list Vendors not located in business directories Vendor address that is: Not a street mailing address Residential Incorrect Multiple addresses 19 of 28
20 Red Flags of Shell Company Schemes Invoices for unspecified or poorly defined services Unnumbered or sequentially numbered vendor invoices Vendor uses unfamiliar contractors Vendors with similar names Vendor and procurement employee have similar or identical information 20 of 28
21 Red Flags of Shell Company Schemes Vendor fails to submit an EIN Unexplained increase in volumes of purchases Boilerplate contracts that have no clear definition of goods or services to be delivered Poor, illegible, or missing documentation supporting a vendor payment 21 of 28
22 Red Flags of Shell Company Schemes Large billings broken into multiple smaller invoices that fall just below a threshold limit An invoice with an even amount (round number) that is not expected or reasonable A check for an out-of-town vendor cashed locally Contracting employee shows interest in invoices submitted by a particular vendor 22 of 28
23 Detecting Shell Company Schemes Check vendor addresses against mail drop address lists. Search for new vendors that have high activity. Research unusually large expenses, unexplained variances in expenses between years, or expenses that exceed budgeted amounts. 23 of 28
24 Detecting Shell Company Schemes Compare all paid contractors to: Approved vendor lists Business directories Telephone reverse directories D&B listings Government business filings Determine if invoiced goods or services were received. 24 of 28
25 Detecting Shell Company Schemes Examine financial statements for variances in expenses that should correlate with revenue. Examine work product from consultants. Examine documentation for payments to contractors that provide services or goods that are difficult to verify. 25 of 28
26 Detecting Shell Company Schemes Conduct a background check to identify: Ownership of contractor Contractors with undisclosed outside business interests or front companies owned by the contracting employee Contractor with family ties with a procurement employee Procurement employees with unexplained increase in wealth or outside income 26 of 28
27 Detecting Shell Company Schemes Cross-check vendor contact information with that of: Employees Employees outside businesses Employees relatives residences and businesses Compare shipping addresses to: Employee addresses Addresses of other vendors 27 of 28
28 Detecting Shell Company Schemes Compare vendor EIN to employees : SSNs Outside business EINs Relatives SSNs Relatives business EINs Conduct an on-site audit of the vendor. 28 of 28
INTERNATIONAL CORRESPONDENT BANKS. Knowing Your Customer (KYC) Anti-Money Laundering Prevention of Terrorist Financing
INTERNATIONAL CORRESPONDENT BANKS Registered Name Commercial name (if applicable) Full address of the registered office of the financial institution (Street, town and country) VAT number BIC code Website:
More informationFraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
More informationWorldwide Anti-Corruption Policy
Worldwide Anti-Corruption Policy I. PURPOSE The laws of most countries make the payment or offer of payment or even receipt of a bribe, kickback or other corrupt payment a crime, subjecting both Eaton
More information[LSC Name] Items Needed for Internal Audit [Audited as of Date]
Items Needed for Internal Audit [Audited as of Date] The following items should be available in preparation for your internal audit: 1. General ledger for the last complete fiscal year and year to date
More informationAnti-Money Laundering and Counter- Terrorism Financial Policy
Anti-Money Laundering and Counter- Terrorism Financial Policy Version: March 2014 1. INTRODUCTION...3 2. DEFINITIONS...3 3. RISK-BASED APPROACH...3 4. AML COMPLIANCE OFFICER...4 5. SUSPICIOUS TRANSACTION
More informationPerformance Audit City s Payment Process
Performance Audit City s Payment Process January 2013 City Auditor s Office City of Kansas City, Missouri 18-2011 Office of the City Auditor 21 st Floor, City Hall 414 East 12 th Street (816) 513-3300
More informationModule # 2 Management/Key Employee Assessment
Module # 2 Management/Key Employee Assessment The management/key employee assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Internal
More informationGlobal Compliance Audit
WHITE PAPER Global Compliance Audit Understanding the Critical Importance of FCPA and Export Management Compliance 333 Route 46 West Suite 200 Mountain Lakes, NJ 07046 1.866.611.7874 973.808.3366 fax 973.227.1873
More informationHow To Prevent Fraud In The United States
Fraud Detection & Prevention for Accounts Payable! Presented by Larry Holmes! Accounts Payable With Fraud! Paying for goods and services that were not received! Paying inflated prices for goods and services!
More informationINTERNATIONAL CORRESPONDENT BANKING
INTERNATIONAL CORRESPONDENT BANKING Know your Customer (KYC) Prevention of Money Laundering and the Financing of Terrorism General Information on the Financial Institution Registered Name Commercial name
More information2: Credit cards, etc. Overview of the sector
19 2: Credit cards, etc Overview of the sector Note: This sectoral guidance is incomplete on its own. It must be read in conjunction with the main guidance set out in Part I of the Guidance. 2.1 A credit
More informationAML & Mortgage Fraud Compliance Program v. 08.2013 ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM
ANTI-MONEY LAUNDERING & MORTGAGE FRAUD COMPLIANCE PROGRAM Version: 2.0 dated 08.2013 TABLE OF CONTENTS AML & Mortgage Fraud Compliance Program 1.0 PURPOSE AND SCOPE... 3 2.0 APPLICABLE REGULATIONS AND
More informationComplying with the U.S. Foreign Corrupt Practices Act
Complying with the U.S. Foreign Corrupt Practices Act 1. About This Manual This Manual describes the Foreign Corrupt Practices Act ( FCPA ), 15 U.S.C. 78m, 78dd, 78ff (collectively, FCPA ), anti-corruption
More informationACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
More informationFighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud
More informationFlorida International University. Identity Theft Prevention Program. Effective beginning August 1, 2009
Florida International University Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Florida International University developed this Identity Theft Prevention Program
More informationWHITEPAPER. Best Practices in Registration Data Management. Government agencies can reduce fraud and turn registrant data into a powerful asset
Best Practices in Registration Data Management Government agencies can reduce fraud and turn registrant data into a powerful asset WHITEPAPER 2011 Dun & Bradstreet Executive Summary E-government has generated
More informationUsing Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
More informationIdentity Theft Prevention Policy
Eastern Kentucky University Policy and Regulation Library 6.#.#P Volume 6, Volume Title: Financial Affairs Chapter #, Chapter Title Section #, Name: Identity Theft Prevention Policy Approval Authority:
More informationCompliance Risk Assessment and 3 rd Party Due Diligence & Monitoring
Advisory Services May, 2011 Compliance Risk Assessment and 3 rd Party Due Diligence & Monitoring Compliance Risk Strategy 3 rd Party Due Diligence 3rd Party Auditing The differing ways in which a company
More informationSFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring. Philip Rodd
SFC AML/CFT Seminar Governance, PEPs & Transaction Monitoring Philip Rodd Agenda Page ML/TF Vulnerabilities for the Securities Industry 3 Governance and Culture 5 PEP Identification 7 Case Study Structuring
More informationDEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM:
DEVELOPING AN AML (ANTI-MONEY LAUNDERING) PROGRAM: Although the Department of the Treasury has not issued specific rules for hedge funds and hedge fund managers, hedge fund managers should adopt and implement
More informationAvoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine
Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine 1 Dear Nonprofit Leader, The single greatest asset of a nonprofit is arguably its reputation. When theft or misappropriation of assets
More informationMisplaced Trust: Vendor Fraud. IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager
Misplaced Trust: Vendor Fraud IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager April 17, 2015 Today s Discussion Summary Vendor fraud is a form of occupational fraud
More informationAnti-Bribery and Corruption Policy
Newcrest strictly prohibits bribery and other unlawful or improper payments made to any individual or entity, as outlined in this Anti-Bribery & Corruption Policy. Newcrest's Anti- Bribery & Corruption
More informationone admin. one tool. Providing instant access to hundreds of industry leading verification tools.
2 7 12 14 11 15 8 16 10 41 40 42 19 49 45 44 50 48 47 51 46 52 53 55 54 56 57 67 68 1 5 39 43 58 71 81 82 69 70 88 25 29 23 26 22 3 21 28 4 6 32 30 38 33 31 37 34 35 36 63 59 64 60 62 61 65 72 73 66 74
More informationAppendix 1 CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES. Criminal Justice Commission Contract Management Policies and Procedures
CJC CONTRACT MANAGEMENT POLICIES AND PROCEDURES SNYOPSIS: The CJC was created by a Palm Beach County ordinance in 1988. It has 21 public sector members representing local, state, and federal criminal justice
More informationNewYork-Presbyterian Hospital Sites: All Centers Hospital Policy and Procedure Manual Number: C150 Page 1 of 10
Page 1 of 10 TITLE: POLICY AND PROCEDURES REGARDING COMPLIANCE WITH THE FOREIGN CORRUPT PRACTICES ACT ( FCPA ) POLICY: All Hospital Personnel are responsible for complying with the U.S. Foreign Corrupt
More informationIdentity theft. A fraud committed or attempted using the identifying information of another person without authority.
SUBJECT: Effective Date: Policy Number: Identity Theft Prevention 08-24-11 2-105.1 Supersedes: Page Of 2-105 1 8 Responsible Authority: Vice President and General Counsel DATE OF INITIAL ADOPTION AND EFFECTIVE
More informationB. Credit - Deferral of payment of a debt incurred for the purchase of goods services, including educational services.
Date Revised: Page 1 of 16 5-21 Identity Theft Prevention Program I. BACKGROUND As a result of the increasing instances of identity theft, the United States Congress passed the Fair and Accurate Credit
More informationCompliance Toolkit. Protecting Charities from Harm. Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY
Compliance Compliance Toolkit Protecting Charities from Harm Chapter 2: Due Diligence, Monitoring and Verification of End Use of Charitable Funds SUMMARY The Charity Commission The Charity Commission is
More informationUniversity of North Dakota. Identity Theft Prevention Program
University of North Dakota Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION University of North Dakota ( University ) developed this Identity Theft Prevention Program
More informationUPDATED. Special Advisory Bulletin on the Effect of Exclusion from Participation in Federal Health Care Programs
UPDATED Special Advisory Bulletin on the Effect of Exclusion from Participation in Federal Health Care Programs Issued May 8, 2013 Updated Special Advisory Bulletin on the Effect of Exclusion from Participation
More informationMonetary Authority of Singapore INSURANCE BUSINESS - INSURANCE FRAUD RISK
Monetary Authority of Singapore INSURANCE BUSINESS November 2007 GUIDELINES ON RISK MANAGEMENT PRACTICES FOR INSURANCE BUSINESS MONETARY AUTHORITY OF SINGAPORE TABLE OF CONTENTS 1 INTRODUCTION AND FUNDAMENTALS
More informationELEPHANT TALK COMMUNICATIONS CORP. FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY
ELEPHANT TALK COMMUNICATIONS CORP. FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY I. POLICY STATEMENT This Foreign Corrupt Practices Act Compliancy Policy (the Policy ) has been adopted by Elephant Talk
More information716 West Ave Austin, TX 78701-2727 USA
How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement
More information{Governmental Client Training} June 20, 2016
{Governmental Client Training} June 20, 2016 2 Online Banking Controls & Fraud Considerations Dan Block, CPA Rumzei Abdallah, CPA Agenda 3 Online Banking Considerations What happened? 7 Controls Commonly
More informationDOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED:
DOYLESTOWN FAMILY MEDICINE, P.C. IDENTITY THEFT PREVENTION PROGRAM TEMPLATE ADOPTED AND EFFECTIVE: APRIL 15, 2009 UPDATED: I. Adoption of Identity Theft Prevention Program Doylestown Family Medicine, P.C.
More informationUNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM
Doc. T08-109 Passed by the BoT 12/11/08 UNIVERSITY OF MASSACHUSETTS IDENTITY THEFT PREVENTION PROGRAM The Board recognizes that some activities of the University are subject to the provisions of the Fair
More informationInternal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
More informationProcurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
More informationI. Purpose. Definition. a. Identity Theft - a fraud committed or attempted using the identifying information of another person without authority.
Procedure 3.6: Rule (Identity Theft Prevention) Volume 3: Office of Business & Finance Managing Office: Office of Business & Finance Effective Date: December 2, 2014 I. Purpose In 2007, the Federal Trade
More informationWheaton College. Updated November 2012. Park Hall, Room 205 Park Hall, Room 202 Phone: 3433/3438 Phone: 3439
Wheaton College Corporate Credit Card User Guide Updated November 2012 For General Information Contact: For Accounting/Reconciliation Info Contact: Business Services Office Accounts Payable Office Park
More informationThird Party Relationships
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 A B D INTRODUCTION AND PURPOSE Background Yes/No Comments 1. Does the credit union maintain a list of the third party
More informationProduct. Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution
Product Onboard Advisor Minimize Account Risk Through a Single, Integrated Onboarding Solution Product Losses from account fraud and debit risk are growing, so you ve got to move quickly and decisively
More informationInternal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
More informationHIGH-RISK COUNTRIES IN AML MONITORING
HIGH-RISK COUNTRIES IN AML MONITORING ALICIA CORTEZ TABLE OF CONTENTS I. Introduction 3 II. High-Risk Countries 3 Customers 4 Products 7 Monitoring 8 Audit Considerations 8 III. Conclusion 10 IV. References
More informationICC Guidelines on Agents, Intermediaries and Other Third Parties
Policy statement Prepared by the ICC Commission on Corporate Responsibility and Anti-corruption ICC Guidelines on Agents, Intermediaries and Other Third Parties Summary These ICC Guidelines on Agents,
More informationA Guide to Benedictine College and Identity Theft
IDENTITY THEFT PREVENTION PROGRAM The risk to Benedictine College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through
More informationIdentifying Key Risk Indicator
PUERTO RICO PAYMENTS SYMPOSIUM Identifying Key Risk Indicator EPOCPR Services Agenda for Today Background History Regulators & Risk Management Let s have fun Regulators & Risk Assessment ACH Risks Categories
More informationIdentity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0
Identity Theft Policy Created: June 10, 2009 Author: Financial Services and Information Technology Services Version: 1.0 Scope: The risk to Loyola University Chicago and its faculty, staff and students
More informationPresented By Greg Baldwin
ANTI-MONEY LAUNDERING COMPLIANCE OFFICER TRAINING Presented By Greg Baldwin THE ANTI-MONEY LAUNDERING COMPLIANCE OFFICER We re going to cover: Basis for the requirement to have a Compliance Officer The
More informationIFA s 45 th Annual LEGAL SYMPOSIUM
LEGAL SYMPOSIUM The Foreign Corrupt Practices Act: What Every International Franchisor Must Know Moderator: Speakers: Eric L. Yaffe Gray Plant Mooty Washington, DC Mary C. Spearing Baker Botts L.L.P. Washington,
More informationPOLICY NO. 449 IDENTITY THEFT PREVENTION POLICY
POLICY NO. 449 IDENTITY THEFT PREVENTION POLICY I. POLICY SUMMARY It shall be the policy of Polk County Rural Public Power District (PCRPPD) to take all reasonable steps to identify, detect, and prevent
More informationDIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY. (Adopted by resolution of the Board of Directors on December 1, 2011)
DIGITAL RIVER, INC. FOREIGN CORRUPT PRACTICES ACT AND ANTI-BRIBERY POLICY (Adopted by resolution of the Board of Directors on December 1, 2011) Digital River, Inc. and our affiliates ( DR ) must comply
More informationLGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
More informationFOREIGN CORRUPT PRACTICES ACT POLICY
FOREIGN CORRUPT PRACTICES ACT POLICY Purpose The purpose of this Policy is to ensure compliance from SWOP's employees and representatives with the US Foreign Corrupt Practices Act ("FCPA"). The Lay Person's
More informationHOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement
More informationIDENTITY THEFT PREVENTION (Red Flag) POLICY
IDENTITY THEFT PREVENTION (Red Flag) POLICY The risk to the College, its employees and students from data loss and identity theft is of significant concern to the College and can be reduced only through
More informationCentral Oregon Community College. Identity Theft Prevention Program
Central Oregon Community College Identity Theft Prevention Program Effective beginning May 1, 2009 I. PROGRAM ADOPTION This program has been created to put COCC in compliance with Section 41.90 under the
More informationA Critical Need: The Importance of AML Compliance for Broker-Dealers
A Critical Need: The Importance of AML Compliance for Broker-Dealers AML is a FINRA Priority For broker-dealer or other financial services firms, it can sometimes appear that in order to reinforce the
More information01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS)
01.230 IDENTITY THEFT PREVENTION PROGRAM (RED FLAGS) Authority: Board of Trustees History: Effective May 1, 2009 (approved initially April 24, 2009) Source of Authority: Related Links: Responsible Office:
More informationELKHORN RURAL PUBLIC POWER DISTRICT POLICY #1230. Identity Theft Prevention Policy
ELKHORN RURAL PUBLIC POWER DISTRICT 1230-1 I. POLICY SUMMARY POLICY #1230 Identity Theft Prevention Policy It shall be the policy of Elkhorn Rural Public Power District ( District ) to take all reasonable
More informationBest Practices for Internet Merchants
Best Practices for Internet Merchants The following best practices, taken from various experts, are offered to help you avoid being victimized by Internet fraud. Experience suggests that there are certain
More informationPayment Processor Relationships Revised Guidance
Federal Deposit Insurance Corporation 550 17th Street NW, Washington, D.C. 20429-9990 Payment Processor Relationships Revised Guidance Financial Institution Letter FIL-3-2012 January 31, 2012 Summary:
More informationFifth annual survey. Look before you leap Navigating risks in emerging markets
Fifth annual survey Look before you leap Navigating risks in emerging markets Table of contents 1 Executive summary 3 Significant concerns over compliance and integrity-related risks 4 Bribery leads the
More informationRESIDENTIAL MORTGAGE LENDERS & ORIGINATORS L COMPLIANCE PROGRAM
RESIDENTIAL MORTGAGE LENDERS & ORIGINATORS L COMPLIANCE PROGRAM PO Box 760 Prosper, TX 75078 972 347 9921 www.americanhfm.com Contents INTRODUCTION... 6 New FinCEN Rule 31 CFR Parts 1010 and 1029... 6
More informationA BISHOPS SERVICES WHITE PAPER. High Impact Hires Hidden Risks & How to Mitigate Them During the Hiring Process
A BISHOPS SERVICES WHITE PAPER High Impact Hires Hidden Risks & How to Mitigate Them During the Hiring Process Introduction Every year, according to the Department of Commerce, employee theft costs U.S.
More informationTel. 202.332.3566 Fax 202.332.3672 www.martinwallcpa.com MANAGEMENT LETTER
Tel. 202.332.3566 Fax 202.332.3672 www.martinwallcpa.com MANAGEMENT LETTER In planning and performing our audit of the financial statements of the U.S. Nuclear Waste Technical Review Board (NWTRB) for
More informationAGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
More informationTHE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS
THE BEST PRACTICES FOR DATA SECURITY AND PRIVACY IN VENDOR/ CLIENT RELATIONSHIPS Data Law Group, P.C. Kari Kelly Deborah Shinbein YOU CAN T OUTSOURCE COMPLIANCE! Various statutes and regulations govern
More informationII. F. Identity Theft Prevention
II. F. Identity Theft Prevention Effective Date: May 3, 2012 Revises Previous Effective Date: N/A, New Policy I. POLICY: This Identity Theft Prevention Policy is adopted in compliance with the Federal
More informationIdentity Theft Policy
Identity Theft Policy Policy/Procedure Section 1: Background The risk to Dickinson College (the College ), its employees and students from data loss and identity theft is of significant concern to the
More informationCOUNCIL POLICY NO. C-13
COUNCIL POLICY NO. C-13 TITLE: POLICY: Identity Theft Prevention Program See attachment. REFERENCE: Salem City Council Finance Committee Report dated November 7, 2011, Agenda Item No. 3 (a) Supplants Administrative
More informationTHE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM
Program Adoption THE UNIVERSITY OF NORTH CAROLINA AT GREENSBORO IDENTITY THEFT PREVENTION PROGRAM As a best practice and using as a guide the Federal Trade Commission s ( FTC ) Red Flags Rule, implementing
More informationUNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM
UNIVERSITY OF RICHMOND IDENTITY THEFT PREVENTION PROGRAM I. Program Adoption. After consideration of the size and complexity of the University s operations and account systems, and the nature and scope
More informationANTI-MONEY LAUNDERING AND COUNTER-TERRORISM FINANCING (AML AND CTF) PROGRAM PART A
PART A 1. AML and CTF Risk Assessment 1.1. This AML & CTF Program sets risk assessment process which is grounded on risk-based approach. 1.2. The main components of the risk assessment process are: 1.2.1.
More informationRed Flag Identity Theft Financial Policy 1.10
Issued: 05/16/2014 Revised: Policy and College ( Seminary ) developed this Identity Theft Prevention Program ("Program") pursuant to the Federal Trade Commission's ( FTC ) Red Flags Rule, which implements
More informationMiami University Purchasing Card Policy & Procedure
Miami University Purchasing Card Policy & Procedure MAY 22, 2015 1 Table of Contents Program Purpose... 3 Overview... 3 Advantages... 4 Getting Started- Card Application & Activation... 4 Capabilities,
More informationCEMEX Anti-Bribery/Anti-Corruption Global Policy
CEMEX Anti-Bribery/Anti-Corruption Global Policy Last updated: December 1, 2011 TABLE OF CONTENTS I. Policy... 1 II. International Anti-Bribery Laws... 1 A. Improper Payments... 2 B. Books and Records...
More informationUNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM
UNION COUNTY S IDENTITY THEFT PREVENTION PROGRAM This program shall become effective November 1, 2008. Adopted this the 20 th day of October, 2008. I. PREFACE The purpose of this program is to detect,
More informationContinuous Monitoring: Match Your Business Needs with the Right Technique
Continuous Monitoring: Match Your Business Needs with the Right Technique Jamie Levitt, Ron Risinger, September 11, 2012 Agenda 1. Introduction 2. Challenge 3. Continuous Monitoring 4. SAP s Continuous
More information3344-19-01 Identity theft prevention program and red flag compliance policy.
3344-19-01 Identity theft prevention program and red flag compliance policy. (A) Program adoption Cleveland state university has developed this identity theft prevention program ( program ) pursuant to
More informationNCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: August 2010 LETTER NO.: 10-CU-15 TO: SUBJ: REF: Federally Insured Credit Unions Indirect Lending
More informationForeign Corrupt Practices Act Policy August 19, 2015
I. PURPOSE To provide guidelines to all officers, directors, employees, consultants and agents that are employed by the Company to ensure compliance with the Foreign Corrupt Practices Act of the United
More informationpbsmartpostage Mail and Shipping Service, Terms of Use
pbsmartpostage Mail and Shipping Service, Terms of Use Account Requirements When you register for the service, you will create a unique user ID and password. Your subscription is billed based on the nine
More informationUniversity of Alaska. Identity Theft Prevention Program
University of Alaska Identity Theft Prevention Program Effective beginning October 31, 2009 I. PROGRAM ADOPTION The University of Alaska ( University ) developed this Identity Theft Prevention Program
More informationTITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM
River Bend Identity Theft Program 1 TITLE XVIII: IDENTITY THEFT PREVENTION PROGRAM Chapter 18.01. IDENTITY THEFT PREVENTION PROGRAM 2 Identity Theft Prevention Program SECTION Chapter 18.01: IDENTITY THEFT
More informationCompliance with the Foreign Corrupt Practices Act
l Compliance with the Foreign Corrupt Practices Act Howard O. Weissman Vice President and Associate General Counsel-International Lockheed Martin Corporation Foreign Corrupt Practices Act U.S. statute
More informationUniversity of St. Thomas. Identity Theft Prevention Program. (Red Flags Regulation Response)
University of St. Thomas Identity Theft Prevention Program (Red Flags Regulation Response) Revised: January 10, 2013 Program Adoption and Administration The University of St. Thomas ( University ) established
More informationHow To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
More informationChapter 15: Accounts Payable and Purchases
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
More informationKey Elements of International Trade Compliance. Presented by:
Key Elements of International Trade Compliance Presented by: International Business Transactions International Civil Litigation 2 I. Introduction Every international shipment implicates at least TWO legal
More informationTexas A&M University Commerce. Identity Theft Prevention Program Effective beginning May 1, 2009
Texas A&M University Commerce Identity Theft Prevention Program Effective beginning May 1, 2009 1 I. PROGRAM ADOPTION Texas A&M University - Commerce ( University ) developed this Identity Theft Prevention
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationModule 10. Good Market Practices Identified from AML/CFT Self-Assessment Program. (October 2007)
Module 10 Good Market Practices Identified from AML/CFT Self-Assessment Program (October 2007) 70 Good Market Practices Identified from AML/CFT Self-Assessment Program This list of good market practices,
More information21.01.04.Z1.01 Guideline: Identity Theft Prevention Program
Texas A&M Health Science Center Guidelines 21.01.04.Z1.01 Guideline: Identity Theft Prevention Program Approved October 7, 2009 Reviewed February 26, 2015 Supplements System Regulation 21.01.04 Reason
More informationCITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
More informationPolicies and Procedures: IDENTITY THEFT PREVENTION
Policies and Procedures: IDENTITY THEFT PREVENTION Section: Chapter: Policy: Compliance Administration Identity Theft Prevention I. PURPOSE The purpose of this policy is to protect patients and West Virginia
More informationTHE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM
THE LUTHERAN UNIVERSITY ASSOCIATION, INC. d/b/a Valparaiso University IDENTITY THEFT PREVENTION PROGRAM SECTION 1: BACKGROUND The risk to Valparaiso University ("University"), its employees, students (in
More information