Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming GASBO Conference. Thomas Buckhoff, Ph.D.
|
|
- Ada Craig
- 7 years ago
- Views:
Transcription
1 Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most commonly stolen by dishonest employees. To catch these people we must first learn how fraudsters divert cash into their pockets. 2 Fraud and Internal Controls Top 5 Fraud Schemes All of the Top 5 fraud schemes exploit one or more deficiencies in basic internal controls. Best way to prevent the schemes: Implement and adhere to basic internal controls! Skimming #1 (Off-book) Cash larceny #2 (On-book) Theft of cash receipts Fictitious #3 Vendor Pass-through #4 schemes Personal #5 Purchases Theft of cash disbursements Billing Schemes 3 Scheme #1: Skimming Theft Act The theft of an organization s cash before it has been recorded in the accounting system Skimming may occur at any point where cash enters a business, so those who receive and process cash are likely perpetrators. Methods: Ring no sale Alter register tape No receipts issued Pocket money Off-hours sales Off-site sales Extra cash register 5 6 Top Five Employee Fraud Schemes Page 1
2 Concealment methods Conversion Destroy record of transaction Lapping Alter customer statements Write off customer account receivable Pad inventory to conceal shortage Fabricate new records Currency can simply be pocketed but checks must be converted to cash. Check conversion methods: Dual endorse checks Forge endorsements Alter payee Open accounts with similar name Swap checks for cash 7 8 Example #1: Skimming Theft act (Loss: $200,000) Sharon stole the cash receipts from one of five cash boxes Concealment Destroyed summary sheet for stolen box Conversion Swapped checks for cash 9 Sharon steals the $200 from Sheet 5. She swaps the $50 of checks from Sheet 5 for $50 of cash from Sheet 4. Sharon then deposits the $800 from Sheets 1-4 into the bank. The actual detail regarding cash and checks on the deposit ticket does not match the $600 of cash and $200 of checks on the summary sheets for Sheets 1-4. Gotcha! X Example #2: Skimming Theft act (Loss: $75,000) Bill stole incoming customer payments Concealment Credited customer s account and debited courtesy discounts Conversion Altered payee on checks Example #3: Lapping schemes Mary steals Customer A s $500 A/R payment. No entry made to record $500 stolen from A. 1. Cash Cash 1,000 A/R Cust. A 500 A/R Cust. B 1, To record $1,000 payment received from Customer B. Mary steals remaining $ To record $1,000 payment from Customer C Top Five Employee Fraud Schemes Page 2
3 Skimming: Prevention Scheme #2: Cash larceny Maintain management presence at point of cash receipt Encourage customers to request receipts Rotate job duties/schedules among employees Two employees open mail Install surveillance cameras Separate cash handling from record keeping 13 The theft of an organization s cash after it has been recorded in the accounting system 14 Theft Act Concealment methods Cash larceny may be perpetrated by anyone who has access to cash. Methods: Steal from the cash register Steal any cash on hand (e.g. petty cash) Steal cash from bank deposit Most times no attempt is made to conceal cash larceny schemes Currency can simply be pocketed but checks must be converted to cash. Conversion Check conversion methods: Dual endorse check Forge endorsement Alter payee Open account with similar name Swap check for cash Other Example #4: Cash larceny Theft act (Loss: $200) Cashier A stole from Cashier B s drawer while B was on break Concealment None. Cashier B got blamed for the shortage. Conversion None needed Top Five Employee Fraud Schemes Page 3
4 Example #5 Fraudulent disbursements Theft act (Loss: $50,000) Sue stole from the company s deposits Concealment Simply forced the cash receipts journal to match the bank statement Conversion None, stole only currency If added correctly, the total should be $100,000. Employee causes the improper distribution of on-book funds. Methods: Billing schemes Expense reimbursement schemes Check tampering 20 Involve the purchase of goods or services that are nonexistent, overpriced, or not needed. Billing schemes Methods: Shell company schemes Fictitious vendor Pass-through Personal purchases Shell company schemes Shell company schemes are typically perpetrated by those with purchasing duties Theft Act Concealment methods Fraudster sets up a shell company and then submits invoices for fictitious goods of services. Variations: Fictitious vendor scheme Passthrough scheme Debit fraudulent disbursement to legitimate expense account. Alter/fabricate disbursement documentation. Alter/pad inventory counts to conceal shortage Top Five Employee Fraud Schemes Page 4
5 Conversion Register shell company with the Secretary of State. Open bank account and PO box in shell company name. Submit false invoices and approve them for payment. Mail checks and retrieve from PO box and then deposit into shell company bank account. 25 Scheme #3: Fictitious vendors Fraudster uses shell company to invoice victim company for goods/services never received. 26 Fictitious vendor scheme illustrated Victim company Invoice sent Invoice paid though nothing is received Fraud loss is total amount of payment made: $15,000 Shell company Example #6: Fictitious vendor scheme Theft act (Loss: $170,000) Steve set up shell companies and sent invoices to his employer Concealment Employer did not control inventory Conversion Retrieved checks from PO box and deposited into bank Top Five Employee Fraud Schemes Page 5
6 Steve s fictitious vendor scheme Scheme #4: Pass-through North Central Construction Invoices sent Invoices paid though nothing is received Fraud loss is total amount of payments made: $170,000 Industrial Supply Specialty Supply Fraudster inserts himself as an unnecessary intermediary usually via a shell company between a legitimate vendor and his employer and makes an unauthorized profit on the transaction. 32 Pass-through scheme illustrated Victim company $15,000 Product/service provided Shell company Vendor $10,000 Fraud loss: $5,000 Example #7: Dairy farm Theft act: Phil stole about $2M via numerous fraud schemes Concealment: None. Barry did not monitor his activities. Conversion: Money went into various bank accounts. 34 Forensic Audit Findings Finding Amount Unaccounted for cows $1,700,000 Checks payable to cash 160,000 Payroll disbursements to kin 304,000 Payments to Red Oak Feed 4,157,668 Investments in milk futures 528,254 Total $6,849, Top Five Employee Fraud Schemes Page 6
7 Pass-through scheme illustrated Dairy Farm, Inc. Product/service provided Lowcountry Feed, Inc. $40, Red Oak $25, Invoice Invoice 1014 Feed Co. Fraud loss: $15, Pass-through scheme illustrated Fraud Losses Total payments made Allegation Potential loss Dairy Farm, Inc. Product/service provided Lowcountry Feed, Inc. Unaccounted for cows $1,700,000 Checks payable to cash 160,000 Payroll disbursements to kin 304,000 $4,157,668 Red Oak $2,737,668 Pass-through scheme 1,420,000 Investments in milk futures 528,254 Feed Co. Fraud loss: $1,420,000 Total potential losses $4,112, Example #8: Pass-through scheme Pass-through scheme illustrated Some government contractors will use shell companies to make it appear like they hired minority companies. The pass-through entity receives a token payment for doing nothing. 41 Sports and Exhibition Authority $3,300,000 Commission: $100,000 Product/service provided Industrial Fabricating Systems, Inc. Hirschfield Steel Co. $3,200,000 Woman-owned business Top Five Employee Fraud Schemes Page 7
8 Scheme #5: Personal Purchases with Company Funds Fraudster purchases goods or services for personal use and tricks employer into paying for them. 43 Personal Purchases: Methods Submit invoices for personal purchases to accounts payable as business expenses. Charge personal expenses on company credit cards. 44 Example #9: In Rita they trusted Theft act: A variety of fraud schemes. Concealment: No one monitored Rita s activities closely. Conversion: Stolen funds diverted to an account Rita controlled. Loss: $54 million 45 Quarter Horse breeding 46 Liberty Coach The Horse Farm Purchased for $2.1M, sold for $800K 47 Purchased for: $540 K 48 Top Five Employee Fraud Schemes Page 8
9 The Primary Residence The Florida vacation home Value: $468K 49 Value: $382K 50 Other expenditures Paid $2.5 million on her personal American Express card Spent $339K on jewelry Spent > $200K on trucks and SUVs Spent hundreds of thousands on horse trailers 51 Into Rita s pocket went $54M 52 Billing schemes: Prevention Proper authorization for disbursements Document receipt of goods and services. Documentation supporting disbursement requests should be reviewed for completeness and accuracy. Conduct frequent inventory counts and reconcile to inventory as per the books. Review credit card statements carefully Segregate duties of: Approving vendors Creating purchase orders Verifying receipt of goods Approving payment on invoices 53 Who has the first question? 54 Top Five Employee Fraud Schemes Page 9
10 Forensic Solutions, LLC Forensic accounting and litigation support services Thomas Buckhoff, Ph.D., CPA/CFF, CFE 130 Hazelwood Drive Statesboro, GA Phone: (912) linkedin.com/pub/thomas-buckhoff/20/465/ Top Five Employee Fraud Schemes Page 10
Fraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
More informationIntroduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA
Introduction to Fraud Examination World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
More informationINTRODUCTION TO FRAUD EXAMINATION
INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
More information5 Important Controls to Mitigate Employee Fraud
5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes
More informationUnderstanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner
Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner Check Fraud Hand-Out Despite the heavy use of credit cards and
More informationFraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
More informationPresented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
More informationFundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
More informationStudent Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements
Student Fraud Project: Forensic Analysis of Personal and Corporate Bank Statements Economic Crime and the Online World 22 nd Annual ECI Conference November 2, 2011 Moderator: Bernard Hyman Jr., Esq. (315)
More informationInternal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
More informationAccounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
More informationCash Flow Management: The Life of Your Business
Cash Flow Management: The Life of Your Business Brian S. Gottschalk CPA Partner GellerRagans Certified Public Accountants Advisors Cash Flow- defined Movement of money received and spent: the pattern of
More informationFinancial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Cash Receipts 2016 Association of Certified Fraud Examiners, Inc. Fraud Tree 2016 Association of Certified Fraud Examiners, Inc. 2 of 27
More informationFraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
More informationHow To Handle A Fraud At Psc
FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent
More information716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
More informationBRIBERY AND CORRUPTION
FRAUD SCHEMES Fraud An intentional act by one or more individuals among management, those charged with governance, employees, or third parties, involving the use of deception to obtain an unjust or illegal
More informationFraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
More informationFINANCIAL CONTROLS POLICIES AND PROCEDURES FOR SMALL NONPROFIT ORGANIZATIONS
By Cindy Cumfer NOTE: These policies and procedures are designed for small nonprofits that do not have an administrator with financial expertise. They are set up to divide the fiscal control roles between
More informationINTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
More informationTop 10 Ways Employees Steal From Their Employers
Top 10 Ways Employees Steal From Their Employers According to the Association of Certified Fraud Examiners, total business fraud in 2009 was $2.9 trillion dollars; small business, defined as less than
More informationINTERNAL CONTROL REFERENCE GUIDE. INTERNAL CONTROLS for GENERAL BUSINESS OPERATIONS
INTERNAL CONTROL REFERENCE GUIDE INTERNAL CONTROLS for GENERAL BUSINESS OPERATIONS Updated by Ohio University Internal Audit Office November 2011 ***This document was retrieved from the Central Michigan
More informationFraud, Internal Control, and Cash
Chapter 7 Fraud, Internal Control, and Cash 7-1 Learning Objectives After studying this chapter, you should be able to: 1. Define fraud ( 欺 騙 ) and internal control ( 內 部 控 制 ). 2. Identify the principles
More informationThe following figures summarize ways in which dut:es could be segregated with two, three and four people.
The following figures summarize ways in which dut:es could be segregated with two, three and four people. Segregation of Duties- Two people Accountant or other financial personnel 11,,. Rec()rdpl~dges
More informationPitt County Schools Individual School Accounting. Internal Controls and Responsibilities Fiscal Year 2009-10
Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Individual School Accounting Internal Controls and Responsibilities Fiscal Year 2009-10 Contents Page Principal Statement
More informationACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
More informationInternal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
More informationSUMMARY OF CORRECTIVE ACTION FOR SEGREGATION OF DUTIES AUDIT ISSUES
SUMMARY OF CORRECTIVE ACTION FOR SEGREGATION OF DUTIES AUDIT ISSUES CASH MANAGEMENT I. Checks a. All checks are restrictively endorsed, using the endorsement stamp maintained by the building secretary.
More informationTable of Contents The Revenue Division s Cash Controls Report Number 2007-01
i Table of Contents The Revenue Division s Cash Controls Report Number 2007-01 EXECUTIVE SUMMARY iii PRELIMINARY Introduction 1 Objective 1 Audit Scope 1 Citywide Ramification 2 CONCLUSIONS 1. REVENUE
More informationGuidelines for Congregations Internal Control Best Practices
Guidelines for Congregations Internal Control Best Practices A resource provided by the Office of the Treasurer of the Evangelical Lutheran Church in America In order to exercise good stewardship and care
More informationHow to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant 281-351-2688
How to set up a people based accounting system that makes your small business work for you. By Thomas G. Post Certified Public Accountant 281-351-2688 www.texastaxman.com 1 Title How to set up a people
More informationNONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL I. Financial Planning/Budget Systems 1. Organization has a comprehensive annual budget which includes all sources and uses of funds for all aspects of
More informationSteven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
More informationFinancial Accounting. John J. Wild. Sixth Edition. McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
Financial Accounting John J. Wild Sixth Edition McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 06 Reporting and Analyzing Cash and Internal Controls Conceptual
More informationMaking Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner tstrause@fosaudit.com 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
More informationVance County Schools Individual School Accounting
Individual School Accounting Internal Controls and Responsibilities Individual School Accounting Internal Controls and Responsibilities Contents Page Principal Statement of Understanding 3 Treasurer Statement
More informationChapter 7 Fraud, Internal Control, and Cash 高立翰
Chapter 7 Fraud, Internal Control, and Cash 高立翰 Study Objectives 1. Define fraud and internal control. 2. Identify the principles of internal control activities. 3. Explain the applications of internal
More informationChapter 12 Solutions to Problems
Problem 1: Solution 1. Safeguard assets. 2. Check accuracy and reliability of accounting data. 3. Promote operational efficiency. 4. Safeguard assets. 5. Promote operational efficiency. 6. Check accuracy
More informationCentre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
More informationChapter 7 Internal Control, Managing Cash, and Making Ethical Judgments 503
Chapter 7 Internal Control, Managing Cash, and Making Ethical Judgments 7 Questions 1. Safeguarding assets is the most fundamental internal control feature because the entity must safeguard its assets
More informationRefund scams come in three basic forms:
REFUND SCAMS Refunds are recognized throughout the retail industry as the most frequently abused transaction, as well as the number one source of cash losses in the retail industry. Literally tens of billions
More informationCASH: CASH CONTROLS C-173 ACCOUNTING MANUAL Page 1. Contents. I. Introduction 2. II. General Description of Cash Operations 2
ACCOUNTING MANUAL Page 1 CASH: CASH CONTROLS Contents I. Introduction 2 II. General Description of Cash Operations 2 III. Bank Account Controls 3 A. Regulations Governing Bank Accounts 3 B. Establishment
More informationOffice of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
More informationPreventing Fraud and Abuse of Public Funds: Local Governments Need to Do Better
Office of the State Comptroller Thomas P. DiNapoli State Comptroller Division of Local Government and School Accountability August 2010 Preventing Fraud and Abuse of Public Funds: Local Governments Need
More informationby: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
More information5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING IF ANY ARE NOT APPLICABLE, INSERT N/A AS YOUR ANSWER. FIRE DISTRICT YEAR UNDER AUDIT
5:31-7 Appendix B LOCAL AUTHORITIES - ACCOUNTING AND AUDITING AUDIT QUESTIONNAIRE FOR FIRE DISTRICT AUDITS EACH QUESTION MUST BE ANSWERED. PLEASE CIRCLE YES OR NO. IF ANY ARE NOT APPLICABLE, INSERT N/A
More informationPayments Fraud Best Practices
Stephen W. Markwell Disbursements Product Executive J.P. Morgan Pamela R. Malmos Director Finance, Treasury Operations ConAgra Foods, Inc. Fraud Prevention Laura Howley, CTP Director, Global Treasury Operations
More informationwww.cebu-cpar.com CEBU CPAR CENTER, INC. AUDIT OF CASH AND CASH EQUIVALENTS
AUDIT OF CASH AND CASH EQUIVALENTS PROBLEM NO. 1 In connection with your audit of Caloocan Corporation for the year ended December 31, 2006, you gathered the following: 1. Current account at Metrobank
More informationFraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
More informationChapter 8. Internal Control. Chapter 8-1
8 Internal Control and Cash 8-1 Internal Control and Cash Internal Control Cash Controls Use of a Bank Reporting Cash The Sarbanes- Oxley Act Principles Limitations Control over cash receipts Control over
More informationACCOUNTING ASSISTANT
MICHIGAN DEPARTMENT OF CIVIL SERVICE JOB SPECIFICATION ACCOUNTING ASSISTANT JOB DESCRIPTION Employees in this job correct, process and reconcile a wide variety of accounting documents such as invoices,
More informationIntroductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal
More informationTechnical Professionals
THE ARC TRAINING GROUP A Division of The ARC Consulting Group, Inc. A Profit Enhancement Firm Providing Educational and Consultative Services to the International Business Community SEMINAR FACT SHEET
More informationPreventing Fraud: The Importance of Internal Controls
Preventing Fraud: The Importance of Internal Controls Presented by: Scott Gold, CPA,BKD, LLP @ BKDForensics Today s Agenda Faces of fraud Real life examples: The latest schemes Lifestyles of the Rich and
More informationLearn Accounting Understand Business: Course Review Answers
Learn Accounting Understand Business: Course Review Answers 1. What type of accounting measures the activity of the company by looking at economic events regardless of when cash transactions occur? A.
More informationAdvanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
More informationTips For An Efficient And Effective Fraud Investigation
Tips For An Efficient And Effective Fraud Investigation Law360, New York (July 14, 2015, 12:03 PM ET) -- Internal fraud can be defined as the use of one s occupation for personal enrichment through the
More informationMEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center
MEMORANDUM To: Municipal Officials From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center 89 Main Street, Suite 4 Montpelier, Vermont 05602-2948
More informationCash Intensive Businesses Audit Techniques Guide - Chapter 7 - Digital Cash and Electronic Money
Cash Intensive Businesses Audit Techniques Guide - Chapter 7 - Digital Cash and Electronic Money NOTE: This document is not an official pronouncement of the law or the position of the Service and can not
More informationDiscovering the Secrets of Detecting Fraud in Accounts Receivable
Discovering the Secrets of Detecting Fraud in Accounts Receivable Speaker Joseph R. Dervaes, CFE, CIA 1995 ACFE Distinguished Achievement Award 2003 ACFE Donald R. Cressey Award 2007 ACFE Outstanding Achievement
More informationFRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
More informationOffice of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs Second Edition American Recovery and Reinvestment
More information2008 Report to the Nation
2008 Report to the Nation on Occupational Fraud & Abuse Letter from the President When the Association of Certified Fraud Examiners was founded 20 years ago, we knew that occupational fraud was a significant
More informationFORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011
FORENSIC ACCOUNTING What s in it for me? Albany, NY June 14, 2011 Presented by Gary J. Cassiello, CPA, ABV, CFF garyc@jgspc.com 845-692-9500 Today s Outline Why is Forensic Accounting important? Executive
More informationInternal Control Guidelines
Internal Control Guidelines The four basic functions of management are usually described as planning, organizing, directing, and controlling. Internal control is what we mean when we discuss the fourth
More informationFiscal Procedure Sequence page number
Table of Contents Fiscal Procedure Sequence page number Treasurer Responsibilities Maintenance of General Ledger Financial Statements Financial Signature/Review Policy Insurance Protection Payroll Procedures
More informationAccounting software & data
Accounting software & data Accounting software and data should reside at church or be webbased where the data base can be accessed by multiple users Multiple people should be trained on software Software
More information8-1. Prepared by Coby Harmon University of California, Santa Barbara Westmont College
8-1 Prepared by Coby Harmon University of California, Santa Barbara Westmont College 8 Fraud, Internal Control, and Cash Learning Objectives After studying this chapter, you should be able to: [1] Define
More informationFraud, Internal Control, and Cash
Prepared by Coby Harmon University of California, Santa Barbara Westmont College 8-1 8 Fraud, Internal Control, and Cash Learning Objectives After studying this chapter, you should be able to: [1] Define
More informationCEBU CPAR CENTER M a n d a u e C I t y
1 of 11 CEBU CPAR CENTER M a n d a u e C I t y AUDITING PROBLEMS AUDIT OF CASH AND CASH EQUIVALENTS PROBLEM NO. 1 You were able to gather the following from the December 31, 2005 trial balance of Peso
More informationFINANCIAL POLICIES INDEX
FINANCIAL POLICIES INDEX Page Accounts Payable 2 Cash Receipts 6 Credit Cards 9 General Ledger Adjustments 10 Fixed Asset 11 Payroll Tax Reporting 13 Travel Reimbursement 14 Handling Mail 15 1 Accounts
More informationInternal Control Requirements December 11, 2002
1 Internal Control Requirements December 11, 2002 Internal controls are mechanisms, policies, and procedures used to minimize and monitor operational risks. In order to deter employees and/or members from
More informationTrust Safety Update. Central Alberta Bar Society Red Deer June 3, 2015
Trust Safety Update Central Alberta Bar Society Red Deer June 3, 2015 Today s Presentation Fraud Schemes & Lawyer s Trust Accounts Risk Mitigation strategies Examples etransactions and Trust Accounts Trust
More informationSTUDENT ACTIVITIES 2009-10 RIVERSIDE SCHOOL DISTRICT NO. 2 GUIDELINES STUDENT ACTIVITIES GUIDELINES
RIVERSIDE SCHOOL DISTRICT NO. 2 *Attach sheet if more space is needed TOTAL $ Beginning Change $ TOTAL Tickets $ TOTAL Merchandise $ TOTAL Receipts $ STUDENT ACTIVITIES GUIDELINES If There is An Overage
More informationFraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
More informationJOB READY ASSESSMENT BLUEPRINT ACCOUNTING-BASIC - PILOT. Test Code: 4100 Version: 01
JOB READY ASSESSMENT BLUEPRINT ACCOUNTING-BASIC - PILOT Test Code: 4100 Version: 01 Specific Competencies and Skills Tested in this Assessment: Journalizing Apply the accounting equation to journalize
More informationA REPORT TO THE CITIZENS OF SALT LAKE COUNTY. BEN McADAMS, MAYOR. An Audit of the Key Controls of. Fleet Management.
A REPORT TO THE CITIZENS OF SALT LAKE COUNTY BEN McADAMS, MAYOR An Audit of the Key Controls of Fleet Management April 11, 2013 GREGORY P. HAWKINS SALT LAKE COUNTY AUDITOR Audit reports are available at
More informationReportable Conditions:
To the Audit Committee and Management of Pecan Plantation Owners Association, Inc. In planning and performing our audit of the consolidated financial statements of Pecan Plantation Owners Association,
More informationFORMER DIXON COMPTROLLER RITA CRUNDWELL SENTENCED TO NEARLY 20 YEARS IN FEDERAL PRISON FOR $53.7 MILLION THEFT FROM CITY
U.S. Department of Justice United States Attorney Northern District of Illinois Gary S. Shapiro 327 South Church St. United States Attorney Suite 3300 Rockford, Illinois 61101 FOR IMMEDIATE RELEASE February
More informationCash in bank checking account $22,500 U.S. treasury bills 5,000 Cash on hand 1,350 Undeposited customer checks 1,840 Total $30,690 Requirement 2
Chapter 7 Solutions EXERCISES Exercise 7 2 Cash and cash equivalents includes: Cash in bank checking account $22,500 U.S. treasury bills 5,000 Cash on hand 1,350 Undeposited customer checks 1,840 Total
More informationGuidelines for Congregations Internal Control Best Practices
Guidelines for Congregations Internal Control Best Practices A resource provided by the Office of the Treasurer of the Evangelical Lutheran Church in America Congregations should establish and maintain
More informationArrests/Convictions/IFBs. First Half 2011 2013. The Insurance Frauds Bureau posted 215 arrests during the first half of 2013.
Arrests/Convictions/IFBs First Half 2011 2013 The Insurance Frauds Bureau posted 215 arrests during the first half of 2013. Number of Arrests 400 350 300 250 200 150 100 50 0 356 377 215 The following
More informationThe Merchant. Skimming is No Laughing Matter. A hand held skimming device. These devices can easily be purchased online.
1 February 2010 Volume 2, Issue 1 The Merchant Serving Florida State University s Payment Card Community Individual Highlights: Skimming Scam 1 Skimming at Work 2 Safe at Home 3 Read your Statement 4 Useful
More informationInternal Controls over Cash for Small Nonprofits
Internal Controls over Cash for Small Nonprofits Internal controls may be a sensitive issue in small nonprofit organizations. These organizations are built on the concepts of honesty, truthfulness, and
More informationChapter 9. Learning Objectives. Define internal control. Objective 1. Internal Control and Cash
PowerPoint to accompany Chapter 9 Internal Control and Cash Learning Objectives 1. Define internal control 2. Describe good internal control procedures 3. Prepare a bank reconciliation and the related
More informationThe policy and procedural guidelines contained in this handbook are designed to:
BASIC POLICY STATEMENT The Mikva Challenge is committed to responsible financial management. The entire organization including the board of directors, administrators, and staff will work together to make
More informationREPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2010 Global Fraud Study Letter from the President When the ACFE published its first Report to the Nation on Occupational Fraud and Abuse in 1996, it
More informationInternal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
More informationB Resource Guide: Implementing Financial Controls
What s in this Guide: I. Definition: What are Financial Controls? II. Why Do You Need Financial Controls? III. Best Practices: Financial Controls to Consider I. Definition: What are Financial Controls?
More informationHow to Avoid Pitfalls in Student Activity Accounting
PASBO 2015 Conference How to Avoid Pitfalls in Student Activity Accounting PASBO Conference March 12, 2015 Agenda and Purpose Review common pitfalls in student activity accounts Auditor perspective on
More informationMEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS
DIVISION OF CHILD CARE AND EARLY CHILDHOOD EDUCATION HEALTH AND NUTRITION UNIT P O BOX 1437, SLOT S 155 501-320-8982 FAX: 501-682-2334 TDD: 501-682-1550 TO: NON-PROFIT INSTITUTIONS FROM: HEALTH AND NUTRITION
More informationSmall Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results
Small Business Fraud Awareness, Prevention and Detection Hands on Consultation with Tangible Results 2012 Fraud & Forensic Accounting Conference Presented by: Robert J. Kollar and Valerie C. Williams Small
More informationAvoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine
Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine 1 Dear Nonprofit Leader, The single greatest asset of a nonprofit is arguably its reputation. When theft or misappropriation of assets
More informationPerp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
More informationIDENTITY THEFT PREVENTION PROGRAM
IDENTITY THEFT PREVENTION PROGRAM Contents Welcome... 3 Overview... 4 Definitions... 5 Red Flags... 6 Red Flag 1 Alerts, Notifications or Warnings from a Consumer Reporting Agency... 7 Red Flag 2 Suspicious
More informationInternal Control and Cash
Accounting Principles, 7 th Edition Weygandt Kieso Kimmel Chapter 8 Internal Control and Cash Prepared by Naomi Karolinski Monroe Community College and Marianne Bradford Bryant College John Wiley & Sons,
More informationA-21 Appendix: Comprehensive Cases CASE A.4: THE WOODEN NICKEL 1
A-21 Appendix: Comprehensive Cases CASE A.4: THE WOODEN NICKEL 1 Background The Wooden Nickel is a small retail clothing store located in Stillwater, Oklahoma, across the street from Oklahoma State University.
More informationManagement and Set up for Cash and Credit Card Handling Procedures
Management and Set up for Cash and Credit Card Handling Procedures This presentation is designed to give managers a brief outline of key procedures and controls that should be in place to safeguard cash
More informationFREQUENTLY ASKED QUESTIONS ABOUT ACCOUNTS PAYABLE WHEN DOES THE STATE OF MARYLAND PAY MY VENDORS?
FREQUENTLY ASKED QUESTIONS ABOUT ACCOUNTS PAYABLE WHEN DOES THE STATE OF MARYLAND PAY MY VENDORS? The state attempts to pay all vendors within 30 days of the Service Date. This is defined as the later
More information