Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
|
|
|
- Norma Daniels
- 10 years ago
- Views:
Transcription
1 Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
2 Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2
3 Fraud Overview
4 Fraud who are these people? Page 4
5 The current environment Bernard Madoff arrested and charged with creating a Ponzi Scheme Losses could reach $50 Billion Madoff, 70 of New York, was charged with securities in what federal prosecutors called a Ponzi Scheme that could involve losses of more than $50 billion. India s Biggest Fraud Satyam Computer s founder B. Ramalinga Raju admitted to inflating the cash balance by nearly $1 billion, incurred a liability of $253 million on funds arranged by him personally, and overstated quarterly revenues by 76% and profits by 97%. The Justice Department accused Siemens of making bribes and trying to falsify its corporate books from 2001 to Siemens AG, settled allegations of corruption of public officials with total fines and penalties of approximately 1 billion. Parmalat, one of the world's largest dairy manufacturers, defaults on a 150 million bond Before investigators could announce that Parmalat overstated its 2003 Earnings by 530%, and understated its liabilities by 1.8 billion, the company declared that 7 billion in liquid assets, believed to exist in a Bank of America account, did not exist at all. By the end of January 2004, Parmalat filed for bankruptcy, with an audit classifying its debt near 14.5 billion. GlaxoSmithKline settles largest health care fraud case in U.S. History GlaxoSmithKline will pay $3 billion and please guilty to promoting two popular drugs for unapproved uses and to failing to disclose important safety information on a third in the largest health care fraud settlement in U.S. history. Page 5
6 Types of Fraud Fraud Schemes Misappropriation of Assets Theft or misuse of tangible and intangible assets. Fraudulent expenditures. Fraudulent Statements Schemes Misstatement or omission of material information/accounting records from financial statements. Corruption Schemes Utilizing influence in business transactions to obtain a personal benefit. Bribery and/or extortion. Aiding and abetting fraud. Fictitious Vendor Theft of Intellectual Property Theft of Assets Payroll Fraud Employee Expense Fraud Cash Skimming Improper Capitalization/ Deferral of Expenses Improper Revenue Recognition Improper Manipulation of Tax Accounts Improper Journal Entries FCPA/UK Bribery Act Procurement Fraud Conflicts of Interest Asset/Liability Manipulation Management Estimates Improper Accounting of I/C Transactions Significant/ Unusual Transactions Page 6
7 Why do people commit fraud? Many studies suggest that employees who commit fraud do so because there is opportunity, pressure, and rationalization Cressey s Fraud Triangle. Opportunity Fraud Triangle Pressure Rationalization This framework is a useful tool for those seeking to understand fraud risks. Page 7
8 Current Environment Increases Fraud Risk Companies and organizations have downsized or are currently downsizing, which has an immediate effect on internal controls. Opportunity Budgets have decreased. Companies and organizations are doing more with less. Increased use of government funds. Fear of layoffs. Stock prices are unstable. Tight credit environment. Pressure/Incentive Internal and External Pressure Opportunity to Commit Fraud Internal Controls With increased pressure and decreased internal controls People will explore more opportunities to create fraud. Attitude/Rationalization Page 8
9 Mitigating Fraud Approaches used by companies to minimize and mitigate potential or existing fraud. Fraud Prevention Setting strong tone at the top Implementing policies and procedures in order to prevent fraud from occurring Developing fraud training and awareness Establishing strong Internal controls Fraud Detection Internal controls Hotline Fraud Response Internal Investigation Independent Investigation Page 9
10 Components of an Anti-Fraud Program Elements of a successful corporate anti-fraud program Code of Ethics Setting the Proper Tone Fraud Prevention Policies Communication and Training Fraud Risk Assessment Proactive Controls Monitoring and Analytics Reactive Incident Response Plan Management Ownership and Involvement Anti-fraud key activities Corporate compliance program design Corporate compliance assessment Gap analysis Future state design session Discovery response planning Records and information management Who owns fraud? Assign roles and responsibilities Fraud and risk committee formulation Customized training Corporate governance Design sessions Corporate anti-fraud roadmap Fraud risk assessment Targeted anti-fraud analytics Internal control monitoring Internal control testing Investigations Response plan Discovery and document review Forensic data analytics Assessment & remediation Continuous improvement Page 10
11 Fraud Prevention
12 Components of an Anti-Fraud Program Fraud Prevention Elements of a successful corporate anti-fraud program Code of Ethics Setting the Proper Tone Fraud Prevention Policies Communication and Training Risk Assessment Proactive Controls Monitoring and Analytics Reactive Incident Response Plan Management Ownership and Involvement Anti-fraud key activities Corporate compliance program design Corporate compliance assessment Gap analysis Future state design session Discovery response planning Records and information management Who owns fraud? Assign roles and responsibilities Fraud and risk committee formulation Customized training Corporate governance Design sessions Corporate anti-fraud roadmap Fraud risk assessment Targeted anti-fraud analytics Internal control monitoring Internal control testing Investigations Response plan Discovery and document review Forensic data analytics Assessment & remediation Continuous improvement Page 12
13 Fraud Prevention Overview A pro-active fraud prevention program is key for every company in its battle against fraud. At minimum, the program must: Reduce risk of fraud Act as a deterrent Reduce opportunity Reduce internal and external pressures Align attitudes of employees Provide an avenue for communication and openness Save money and resources in the long run and reduce potential fraudulent activities Page 13
14 Fraud prevention measures Tone at the top Anti-fraud programs Code of ethics Policies and procedures Continuous communication and reinforcement of fraud prevention programs Anti-fraud training Fraud risk assessments Page 14
15 Setting the Tone A robust anti-fraud program includes: Executive management involvement Employee code of ethics Clear company fraud prevention policies Communication and awareness of policies Continuous training and education on anti-fraud policies Disciplinary action and zero tolerance for violations Communication of violations and disciplinary actions Page 15
16 Code of Ethics Development Documentation Communication Disciplinary Actions Global Operations Monitoring Page 16
17 Fraud Prevention Policies & Procedures Fraud prevention policies should also include internal controls preventing fraud, such as: Extensive background checks New-hires Promotion candidates Suppliers, customers and business partners (including international third parties) Segregation of duties Position rotations Limitations of physical access to assets Removal of unauthorized and old system users Page 17
18 Training & Communication After policies and procedures are developed they must be effectively communicated Management involvement in delivering the message In-person and web-based training Positive affirmation of policies Periodic reminders once is not enough Consider annual confirmation for high risk functions Training people to recognize and report red flags Special training for finance professionals Special training for senior executives Special training for others in high-risk positions (i.e. business developers, sales and marketing) Broad rollout of anti-corruption measures Page 18
19 Fraud Risk Assessment Purpose of fraud risk assessments To demonstrate that management is setting the proper tone within the organization regarding fraud To understand vulnerabilities within the company To identify and evaluate areas that pose a higher risk of fraud To identify where the company should focus its anti-fraud resources To identify areas of improvement Page 19
20 Fraud Detection
21 Components of an Anti-Fraud Program Fraud Detection Elements of a successful corporate anti-fraud program Code of Ethics Setting the Proper Tone Fraud Prevention Policies Communication and Training Risk Assessment Proactive Controls Monitoring and Analytics Reactive Incident Response Plan Management Ownership and Involvement Anti-fraud key activities Corporate compliance program design Corporate compliance assessment Gap analysis Future state design session Discovery response planning Records and information management Who owns fraud? Assign roles and responsibilities Fraud and risk committee formulation Customized training Corporate governance Design sessions Corporate anti-fraud roadmap Fraud risk assessment Targeted anti-fraud analytics Internal control monitoring Internal control testing Investigations Response plan Discovery and document review Forensic data analytics Assessment & remediation Continuous improvement Page
22 Fraud Detection Overview Detection is the key in mitigating fraud when there are gaps in companies fraud prevention programs or when perpetrators circumvent existing policies Fraud detection measures include: Established procedures and avenues for reporting suspicious and fraudulent activities Financial statement analytics Targeted anti-fraud analytics Internal control monitoring Internal control testing Page
23 Sources of Detection Internal Hotline Whistleblower allegations Concerns raised by employees Internal Audit findings External Industry issues and events External auditor (Section 10A) Analysts Regulator questions e.g. SEC, DOJ, IRS Other business events (e.g., commercial disputes, loan defaults, business failure) Page
24 How is fraud detected? Source: ACFE 2010 Report to the Nations On Occupational Fraud 2012 ACFE Report to the Nation on Occupational Fraud 50% by tip or accident Page
25 Unstructured Data Structured Data Forensic analytics maturity model Beyond traditional rules-based queries consider all four quadrants Low Detection Rate High Matching, Grouping, Ordering, Joining, Filtering Anomaly Detection, Clustering Risk Ranking Traditional rules-based Queries & Analytics Statistical-Based Analysis Keyword Search Traditional Keyword Searching Data visualization, Drill-down into data, Text Mining Data Visualization & Text Mining High False Positive Rate Low Page
26 Transaction Risk Scoring Review breaches on targeted analytics Filter by selected analytics Page
27 Finding hidden money Duplicative payments to fictitious vendors Different Vendor ID Same Date Exact Same Amount Different Invoice # Same Reference / Job Code Similar names Some with same address Page
28 Travel & entertainment an FCPA risk example Who entertained whom, where, what for and for how much? Page
29 Fraud Response
30 Components of an Anti-Fraud Program Fraud Response Elements of a successful corporate anti-fraud program Code of Ethics Setting the Proper Tone Fraud Prevention Policies Communication and Training Risk Assessment Proactive Controls Monitoring and Analytics Reactive Incident Response Plan Management Ownership and Involvement Anti-fraud key activities Corporate compliance program design Corporate compliance assessment Gap analysis Future state design session Discovery response planning Records and information management Who owns fraud? Assign roles and responsibilities Fraud and risk committee formulation Customized training Corporate governance Design sessions Corporate anti-fraud roadmap Fraud risk assessment Targeted anti-fraud analytics Internal control monitoring Internal control testing Investigations Response plan Discovery and document review Forensic data analytics Assessment & remediation Continuous improvement Page
31 Fraud Response - Investigating fraud allegations Overview Components of an Anti-Fraud Program Fraud Response Response Protocols Types of Investigations Steps to a Successful Investigation Reporting the Results Investigation Challenges Page
32 Fraud Response Overview Plan Execute Report Page
33 Response Protocols Receive the allegation Understand the nature of the allegation Determine whether it involves a potential violation of laws, rules, or company policy (establish privileged as appropriate) Ask the following questions: What is the source of the allegation When and where did the events occur and over what period of time What evidence may exist Who may be involved Who is likely to have relevant knowledge or information What will be the role of each stakeholder Determine the appropriate course of action Consult the necessary resources to determine the next steps Assemble the team to conduct the investigation Preserve the data, especially electronic data Page
34 Types of Investigations Internal Investigation Conducted at the direction of management and the Company s in-house or outside counsel. Independent Investigation Conducted at the direction of a committee of the Board of Directors (e.g. Audit Committee or Special Committee) with outside counsel. The Compelling Case for an Independent Investigation Consistent with focus of Sarbanes-Oxley Credibility with regulators i.e. SEC and DOJ Expectation of external auditor Expectation of regulators Best practice Page
35 Steps to a Successful Investigation First Things First Preserve the environment, including electronic and hardcopy documentation Define scope of investigation Critical early step that needs to be articulated to keep investigation on track Develop process that enables input by appropriate stakeholders Understand that scope may need to be revised as facts are gathered Determine privilege Assemble an appropriate investigative team Develop investigative work plan Establish communication protocol Audit / Special Committee External auditor Regulatory bodies Page
36 Reporting the Results Consider appropriate format Oral or written PowerPoint, Word or other Report Contents Issues raised / Scope of investigation Timeline of investigation Procedures performed Data collected / considered Chronology of key events Issue-specific topics (e.g., specific transactions, sales activity, T&E policies) Findings & observations Remediation considerations Transmittal of report Distribute based on protocol established by counsel Disclosure to regulators, stakeholders, and other third parties (if applicable) Page
37 Questions? Dean Bunch, Partner Ernst & Young LLP Fraud Investigation & Dispute Services Page
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Fraud Triangle Analytics Anti-Fraud Research and Methodologies
Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
How To Understand And Understand Forensic Accounting
Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Fraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
Fraud-Related Compliance
Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments
Managing FCPA (Foreign Corrupt Practices Act) Risks
Managing FCPA (Foreign Corrupt Practices Act) Risks Diana Shin - Partner Jacqueline Fan Associate Director Fraud Investigation and Dispute Services July 2010 Agenda 1. Compliance pressure points 2. Putting
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
Financial Services Group
Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner [email protected] 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
Fraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
Demystifying Big Data Analytics
Demystifying Big Data Analytics Practical approaches to business intelligence and forensic analytics 9 May 2013 Discussion topics Big Data & Big Data Analytics Current fraud risks - industry research Components
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
The auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
FCPA Compliance: An Investigator s Perspective. By Joseph Picarello
FCPA Compliance: An Investigator s Perspective By Joseph Picarello Agenda FCPA Overview Background Provisions What s prohibited? / What s permissible? Fines / Other Consequences UK Bribery Act Common Fraud
BARRICK GOLD CORPORATION
BARRICK GOLD CORPORATION Code of Business Conduct and Ethics Introduction Barrick s success is built on a foundation of personal and professional integrity and commitment to excellence. As a company and
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
Centre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
Using Data Analytics to Detect Fraud. Other Data Analysis Techniques
Using Data Analytics to Detect Fraud Other Data Analysis Techniques Qualitative Data Analysis Most data analysis techniques require the use of data in the form of numbers. Qualitative data analysis is
Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations
Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14
Fraud Risk Management and Internal Audting
Fraud Risk Management and Internal Audting Waheed Alkahtani CFE and CCEP-I Saudi Aramco Internal Auditing Special Audits Division Copyright 2015, Saudi Aramco. All rights reserved. February 2015 What do
TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
Fraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
Glossary 2. About this chapter 3. 7.1 About fraud and corruption prevention and control 4
Contents Glossary 2 About this chapter 3 7.1 About fraud and corruption prevention and control 4 7.1.1 How to use this toolkit 5 7.1.2 What is fraud and corruption? 6 7.1.3 The Australian Standard AS 8001:2008
IPPF Practice Guide. Internal Auditing and Fraud
IPPF Practice Guide Internal Auditing and Fraud December 2009 IPPF Practice Guide Table of Contents Introduction... 1 Executive Summary... 2 Definition of Fraud... 4 Fraud Awareness... 5 A. Reasons for
GLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
Taking Data Analytics to the Next Level
Taking Data Analytics to the Next Level Implementing and Supporting Big Data Initiatives What Is Big Data and How Is It Applicable to Anti-Fraud Efforts? 2 of 20 Definition Gartner: Big data is high-volume,
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
SPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
Fraud and the Government Internal Auditor
Fraud and the Government Internal Auditor January 2012 Fraud and the Government Internal Auditor January 2012 Official versions of this document are printed on 100% recycled paper. When you have finished
Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA
Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is
Procurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
a. employees Company; or
Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
Cressey s fraud triangle: All 3 conditions must be present for fraud to occur
DEfINITION Of fraud AND fraud INvESTIgATION Dilek ÇİLİNgİR Ernst & Young What is fraud? According to International Standard on Auditing (240): An intentional act By one or more individuals among management,
Fraud-Related Compliance
Fraud-Related Compliance Investigating and Reporting 2015 Association of Certified Fraud Examiners, Inc. Investigations, Reporting, and Compliance Investigations benefit victim organizations by: Recovering
Conducting Fraud Risk Assessments Successfully. Mary Breslin MBA, CIA, CFE
Conducting Fraud Risk Assessments Successfully Mary Breslin MBA, CIA, CFE Course Agenda One Principals for Managing Fraud Risk in an Organization Two Fraud Risk Assessment Basics Three Fraud Basics Four
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 1719 AU Section 316 Consideration of Fraud in a Financial Statement Audit (Supersedes SAS No. 82.) Source: SAS No. 99; SAS No. 113. Effective for audits
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
FCPA and International Compliance
FCPA and International Compliance Briefing to San Antonio Post, SAME C. Ernest Edgar IV General Counsel, Atkins North America 1 Agenda Understanding the FCPA The Nuts and Bolts of the FCPA Who Is Covered
THE US FOREIGN CORRUPT PRACTICES ACT ( FCPA ) COMPLIANCE POLICY AND GUIDELINES
THE US FOREIGN CORRUPT PRACTICES ACT ( FCPA ) COMPLIANCE POLICY AND GUIDELINES 1. INTRODUCTION 1.1 The purpose of this policy is to provide all employees, directors and officers of DRDGOLD Limited, its
Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud
Sobel & Co. s Nonprofit and Social Services Group presents Your Organization is Vulnerable: The Facts About Nonprofits and Fraud Why Smart People Do Dumb Things If you are above average intelligence -
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
Leonard W. Vona, CPA, CFE
Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: [email protected] Part of an auditor s job is
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Fraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON 240 THE AUDITOR S RESPONSIBILITIES RELATING TO (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
Complying with the U.S. Foreign Corrupt Practices Act
Complying with the U.S. Foreign Corrupt Practices Act 1. About This Manual This Manual describes the Foreign Corrupt Practices Act ( FCPA ), 15 U.S.C. 78m, 78dd, 78ff (collectively, FCPA ), anti-corruption
How To Know If You Can Get A Job At A Company
What Maritime Lawyers Need to Know about the Foreign Corrupt Practices Act (FCPA) and other anti-corruption laws? Presented by Evelyn M. Suarez & Jim Barratt 2015 Port Administration & Legal Issues Seminar
Fraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
LAUREATE ANTI-CORRUPTION POLICY
LAUREATE ANTI-CORRUPTION POLICY Laureate Anti-Corruption Policy 1.0 PURPOSE AND BACKGROUND This Anti-Corruption Policy establishes basic standards and a framework for the prevention and detection of bribery
Platform Specialty Products Corporation Foreign Corrupt Practices Act/Anti-Corruption Policy
1. Introduction. Platform Specialty Products Corporation Foreign Corrupt Practices Act/Anti-Corruption Policy 1.1 Combating Corruption. Platform Specialty Products Corporation, including its subsidiaries,
FEI Canada. Fraud Prevention. Presented by: Matthew McGuire and Leigh Beijer. Date:
FEI Canada Fraud Prevention Presented by: Date: Matthew McGuire and Leigh Beijer June 11, 2015 Agenda Presenter Introductions Overview Elements of a fraud program Investigating Fraud Page 2 Presenter Introductions
SEKO Logistics Anti-Corruption and Foreign Corrupt Practices Act Policy
SEKO Logistics Anti-Corruption and Foreign Corrupt Practices Act Policy General Policy: SEKO Logistics ( SEKO ) conducts its business ethically and in compliance with all laws in the countries where SEKO
FCPA 10 Hallmarks Self- Assessment
FCPA 10 Hallmarks Self- Assessment How exposed is your business to corruption risk? Take this assessment to find out if your systems are sufficiently robust to protect your business October 2014 Prepared
Assessment for Establishing a Whistleblower Hotline:
Report # 2012-01 Assessment for Establishing a Whistleblower Hotline: Establishing a whistleblower hotline could benefit the City by empowering employees to report fraud, waste and Establishing a whistleblower
WHISTLEBLOWING POLICY NUS policies adopted and adapted by Yale-NUS College
WHISTLEBLOWING POLICY NUS policies adopted and adapted by Yale-NUS College Introduction 1. The University and Yale-NUS College (the College) are not-for-profit organizations that rely largely on public
Forensic Accounting: An Introduction
Forensic Accounting: An Introduction Forensic Accounting Forensic Accountants are part investigator, part auditor, part solicitor and part accountant. Forensic Accountants utilise an understanding of business
E Distribution: GENERAL POLICY ISSUES. Agenda item 4 WFP ANTI-FRAUD AND ANTI-CORRUPTION POLICY. For approval
Executive Board Second Regular Session Rome, 8 11 November 2010 POLICY ISSUES Agenda item 4 For approval WFP ANTI-FRAUD AND ANTI-CORRUPTION POLICY E Distribution: GENERAL WFP/EB.2/2010/4-C/1 29 September
Compliance Program@Siemens
Program@Siemens Nadeem Anwer Regional Officer Siemens LLC UAE Strengthening Integrity In Private Sector Organized by UNDP, MENA-OECD Bahrain 16 th and 17 th of March 2010 Siemens AG 2009. All rights reserved
