Fraud and Internal Audit: Current Views, Examples, and Resources. Institute of Internal Auditors, Birmingham Chapter
|
|
|
- Magnus Cunningham
- 10 years ago
- Views:
Transcription
1 Fraud and Internal Audit: Current Views, Examples, and Resources Institute of Internal Auditors, Birmingham Chapter September 2012
2 Contents 1. Fraud in Context 2. Fraud Basics 3. Corporate-Wide Anti-Fraud Framework 4. Internal Audit s Role 5. Digital Forensic Investigation References & Resources Open Discussion / Q&A
3 Fraud in Context
4 1. Fraud in Context Definition Fraud is generally defined in the law as an intentional misrepresentation of material existing fact made by one person to another with knowledge of its falsity and for inducing the other person to act, and upon which the other person relies with resulting injury or damage. Fraud may also be made by an omission or purposeful failure to state material facts, which nondisclosure makes other statements misleading (USLegla.com). 4
5 1. Fraud in Context ACFE Report to the Nations Typical entity loses 5% of annual revenue to fraud. Global fraud loss estimated at more than $3.5 trillion. U. S. loss estimated at more than $750B (5% of GDP) Loss median of $140k and 25% over $1M. Median of 18 months before detection. 5
6 1. Fraud in Context Traditional View of Fraud Risk Traditional views have resulted in a fragmented (not integrated / holistic) risk framework and reactive approach to fraud. Fraud risk and controls considered as separate, secondary objectives of internal audit and internal control Fraud not perceived to be an internal control failure Fraud training and awareness not really necessary Information and Communication disparaged Fraud risk monitoring not perceived as a positive cost-benefit allocation of resources 6
7 1. Fraud in Context Progression of Fraud Related Legislation Foreign Corrupt Practices Act 1977 and amended in 1998 by the international Anti-Bribery Act. The SEC investigated over 400 U.S companies that admitted to making illegal payments to government functionaries, e.g. Lockheed and Bananagate. What act does the following describe? would require auditors to institute specific procedures aimed at finding fraud or illegalities, regardless of how significant or material to the company`s financial statements. Auditors also would be required to evaluate, in writing, the quality of the client company`s internal controls. Financial Fraud Detection and Disclosure Act of
8 1. Fraud in Context Progression of Fraud Related Legislation U.S Sarbanes-Oxley Act of 2002 SEC rules have implemented and expanded on the U.S Sarbanes-Oxley Act of 2002 including 404 controls related to the prevention, identification and detection of fraud. The Enron Scandal Dodd-Frank Wall Street Reform and Consumer Protection Act, 2010 Responses to financial crisis of CFPB tracing back from the source the customer 8
9 1. Fraud in Context Prosecution of Corporate Criminals From the Corporate Fraud Task Force (CFTF) yielded results of over 1,236 total corporate fraud convictions, including: 214 CEO s and Presidents 53 Chief Financial Officers; 23 Corporate Counsels or Attorneys; and 129 Vice Presidents The CFTF was replaced in November of 2009 with the Financial Fraud Enforcement Task Force. By 2011: 1,517 defendants charged, convicted or sentenced, resulting in $3.5B losses recouped. 9
10 1. Fraud in Context Impact of Legislation Organizations liable for offence and failing to have controls in place Demanding anti-fraud programs with a focus on prevention and timely detection Increased management responsibility towards fraud risk Independent auditors required to evaluate sufficiency in fraud controls 10
11 1. Fraud in Context Current View of Fraud Risk Current view aims to manage fraud risk holistically and proactively. Fraud risk and controls considered an objective of internal control activities Fraud perceived to be potential internal control failures Fraud training and awareness necessary Information and Communication aggregated, concise, and timely Fraud risk monitoring perceived as positive cost / benefit (protects revenue and/or recoups losses) 11
12 Fraud Basics Defining the basic fraud types Differentiating fraud risk from other risks Assessing fraud risks
13 2. Fraud in Context Defining Basic Fraud Types Occupational fraud is the most practical categorization related to Internal Audit, and is intentional misuse of financially-related employment matters for personal gain. Differs from other crimes outside the work environment (ex. romance scams ), that do not result in gain (ex. denial of service), or that are not financially related (ex. stealing another s possession to spy ). ACFE Occupational Fraud Categories Asset misappropriation (high #, low $) Financial Statement Fraud (low #, high $) Corruption (moderate # and $) 13
14 2. Fraud in Context Differentiating Fraud Risk The auditor mindset towards fraud differs from the other common audits; the mindset should be investigative and anomaly-oriented (generally auditors are trained to address the majority risk). Fraud risk impact and residual risk is difficult to measure. Fraudsters are not who you may think The most common fraudster profile may contradict your intuition a well-educated, middle-aged male, with no criminal history. 10% of people will always commit fraud, 10% of people will never commit fraud and 80% of people given the opportunity will commit fraud. Technical expertise is needed in terms of assessing fraud risk, investigation techniques, gathering and maintaining evidence, etc. Consult with internal or external experts if you think your task may be greater than your means. 14
15 2. Fraud in Context Assessing Fraud Risk Top-Down All industries are not created equal Source: ACFE RTTN Source: PwC GECS Generally speaking, risks are in cash and other liquid assets Source: ACFE RTTN Source: PwC GECS 15
16 2. Fraud in Context Assessing Fraud Risk Top-Down Certain areas and position levels most commonly experience fraud Source: ACFE RTTN Source: ACFE RTTN Source: PwC GECS 16
17 2. Fraud in Context Assessing Fraud Risk Top-Down Based on overarching fraud risk, scheme/scenario-based risk assessment can be effective, using red flags associated with the scheme and the fraud triangle to further refine articulation of residual risk. Fraud Tree and Schemes Fraud Triangle Source: ACFE RTTN Source: ACFE RTTN 17
18 2. Fraud in Context Assessing Fraud Risk Mitigation Research consistently reflects the most common detection methods and effective anti-fraud controls. (U. S. 1,001 Cases) Source: ACFE RTTN Source: ACFE RTTN 18
19 Corporate-Wide Anti-Fraud Framework
20 3. Corporate-Wide Anti-Fraud Framework Anti-Fraud Model 1 2 Anti-Fraud Policy Leadership Assignments: Roles & Responsibilities 3 Risk Assessment Prevention Detection Investigation / Response 4 20
21 3. Corporate-Wide Anti-Fraud Framework Anti-Fraud Policy Starts with the Tone at the Top Does your organization have an Anti-Fraud Policy approved by the board of directors? The concepts incorporated in an Anti-Fraud Policy are developed to detect and prevent fraud and to implement effectively and homogeneously the policies and objectives set by management. Convey the expectations of the board of directors and senior management regarding fraud risk and control. 21
22 3. Corporate-Wide Anti-Fraud Framework Leadership, Assignments, Roles & Responsibilities Typical organization responsibilities include: Tone at the Top Executive Leadership Establish Internal Controls Management/Accounting Code of Conduct - Legal Employee Assistance Program Human Resources Hotline Administration Various Resources Referral to Law Enforcement Corporate Security Who is responsible for the implementation of an Anti-Fraud Framework? Even though management is ultimately responsible Everybody has a part to play in the prevention, detection and investigation of fraud. 22
23 3. Corporate-Wide Anti-Fraud Framework Fraud Risk Assessment Risk assessment should be both periodic and continuous Assessment should include Consideration of the most likely fraud schemes / scenarios (based on external and internal factors) Root cause analysis of fraud that has occurred and the evaluation of fraud risks Analysis of the affectivity of prior measures Prioritization and design of new measures Reviews of anti-fraud measures and controls should be considered in terms of coverage, frequency and results 23
24 3. Corporate-Wide Anti-Fraud Framework Fraud Prevention & Mitigation Due Diligence carried out on all employees and third parties. Code of Conduct Agreement & Renewal Training & Communication Revision of critical controls in processes and operations Annual continuous leave for key employees If a person leaves their position for e.g. 2 weeks will another employee that takes over their role likely identify a fraud given the controls in place? Conflict of Interest Policy 24
25 3. Corporate-Wide Anti-Fraud Framework Fraud Detection Whistleblower Channels Protection of employees reporting suspected fraud External anonymous reporting Investigation referral address Internal Audit relationships in lines of business may facilitate tips / investigation requests Management Review Alerts Running fixed routines on data to detect anomalies. 25
26 3. Corporate-Wide Anti-Fraud Framework Fraud Detection - Investigation Considerations Internal Investigations Audit Director Roundtable has a Taxonomy of investigations and corresponding roles External Investigative Resources Corporate Security Investigations Documentation of the results of the investigation Index of exhibits Fidelity Guarantee 26
27 3. Corporate-Wide Anti-Fraud Framework Fraud-Related Reporting In the end you want to give assurance to the Board that adequate controls are in place to detect and prevent fraud. Consider Recommended changes to Anti-Fraud Policy Quarterly reports Risk assessment results Material cases of fraud 27
28 3. Corporate-Wide Anti-Fraud Framework Summary 28
29 Internal Audit s Role
30 4. Internal Audit s Role Internal Audit Standards IIA Standard 1200: Proficiency and Due Professional Care 1210.A2 Internal auditors must have sufficient knowledge to evaluate the risk of fraud and the manner in which it is managed by the organization, but are not expected to have the expertise of a person whose primary responsibility is detecting and investigating fraud. IIA Standard 1220: Due Professional Care 1220.A1 Internal auditors mustexercise due professional care by considering the: Probability of significant errors, fraud, or noncompliance. IIA Standard 2060: Reporting to Senior Managementand the Board The chief audit executive (CAE) must report periodically to senior management and the board on the internal audit activity s purpose, authority, responsibility, and performance relative to its plan. Reporting must also include significant risk exposures and control issues, including fraud risks, governance issues, and other matters needed or requested by senior management and the board. IIA Standard 2120: Risk Management 2120.A2 The internal audit activity must evaluate the potential for the occurrence of fraud and how the organization manages fraud risk. IIA Standard 2210: Engagement Objectives 2210.A2 Internal auditors must consider the probability of significant errors, fraud, noncompliance, and other exposures when developing the engagementobjectives. 30
31 4. Internal Audit s Role Role & Organizational Structure Internal Audit (IA) supports management by determining whether the organization has adequate internal controls and promotes an adequate control environment. Since IA is a centralized, independent, and objective function, it is in a prime position to address fraud risk management programs, and to affect change. Different organizational structures and IA charters affect IA s role and ability to achieve that role. 31
32 4. Internal Audit s Role An Example Internal Audit Fraud Unit at BBVA Compass 32
33 4. Internal Audit s Role Internal Audit Fraud Risk Policy Identifies the CAE with the primary responsibility for dealing with among others, investigation when the involvement of Internal Audit is deemed necessary. Establishment of a Specific Unit within Internal Audit to address Fraud Risk. The policy applies to any irregularity or suspicious activity involving Employees, Board of Directors, consultants, vendors and any other parties that have a relationship with the Organization. General Principles: Purpose is guided by Company Charter, IA Policy, code of ethics etc Authority in determining Fraud Scope, performing work and communicating results with unrestricted access to Organization records Independence, Objectivity & Continuous Education Scope of Activities Fraud Prevention and Investigation 33
34 4. Internal Audit s Role Fraud Risk Assessment A Fraud Risk Assessment (FRA) is a process aimed at proactively identifying and addressing an organization s vulnerabilities to both Internal and External Fraud. A FRA is a key element of anti-fraud programs including Annual Audit Planning. A FRA assists auditors to comply with professional standards: AICPA. Statement on Auditing Standards No. 99. and Nos PCAOB. Auditing Standard No IIA. Practice Advisory 1210.A2-1. And Proposed Standard 2120.A2 Particular goals are: Highlight the Fraud Focus Points (High) where the performance of an audit may need to beadjusted within the 2012 annual plan, Provide assurances that the risk of Fraud is being effectively incorporated within the Internal Audit Risk Assessment, and, Minimize the risk of overlooking fraud during Internal Audit planning stages 34
35 4. Internal Audit s Role FRA Methodology Scenarios Define a list of fraud scheme scenarios based on experience of the IA Fraud Team together with internal & external data. Ranking^ Possible Fraud Group Origen 1 Check Fraud Misappropriation External 2 Deposit Fraud Misappropriation Int/Ext 3 Debit/ATM Card Fraud Misappropriation External 4 Inappropriate Banking/Commercial Practices Others & Reputational Internal 5 Other Loans Fraud Schemes Misappropriation Internal 6 Credit Card Fraud Misappropriation External 7 Money Laundering Others & Reputational Int/Ext 8 Cashier's Check Fraud Misappropriation Internal 9 Mortgage Loan Fraud Misappropriation Int/Ext 10 Wire Transfer Fraud Electronic Int/Ext 11 ACH Fraud Electronic External 12 CD/Savings Embezzlement Misappropriation Int/Ext 35
36 4. Internal Audit s Role FRA Methodology Risk Model A risk model maps and assess the Organization s vulnerability to identified fraud scenarios, with a scale is defined to evaluate each of the factors as follows: Factor 4 1 Likelihood High Probability Rarely Occurring Frequency Widespread Only selected areas Materiality High dollar Amount Low dollar amount Reputational Risk Significant loss of reputation or loss of public trust Minimal loss of reputation or loss of public trust 36
37 4. Internal Audit s Role FRA Methodology Results & Focus Points Focus Points Low High Medium Critical 37
38 4. Internal Audit s Role Assisting in Annual Planned Audits A Fraud Unit within Internal Audit can specifically design anti-fraud tests and integrate fraud audit techniques into the IA process of Ongoing Reviews. Include Investigation results and analysis in the scope and planning of an audit. Include processes for addressing fraud in the audit universe and plan as an unavoidable element of the annual risk assessment process. 38
39 4. Internal Audit s Role Fraud Testing Design and carry out fraud prevention and detection programs for areas of the organization with functions related to Risk, Compliance, and other LOB s Help management to identify and assess risks that may result in a material misstatement due to fraud, through monitoring of financial statements. Carry out detective fraud investigations through suggested automatic examination methods, CAAT s, as well as data mining software. 39
40 4. Internal Audit s Role Fraud Investigation Help management to identify critical indicators of fraud schemes Evaluate gaps in internal controls during the progression of fraud reviews/investigations Conduct ad-hoc forensic accounting investigations Support the Chief Audit Executive to ensure appropriate communication about fraud issues addressed by IA to the Board, the Audit Committee and others. 40
41 4. Internal Audit s Role Internal Fraud Audit Development Considerations Foster Sponsorship & Support Executive Sponsorship - Have clear visibility with the Board/Audit Committee Exposure and Networking with other areas of the organization Respect from Legal, Human Resources, Investigations, LOB s (large source of cases) There must be clearly defined roles & responsibilities. Present those to the different areas involved. Acquire & Develop Expertise Look for specific skill sets. CPA, CFE, CIA, Data Analytics and law enforcement experience (especially good for interviewing techniques) Legal elements of a fraud investigation Data Analytics - ACL, IDEA Interviewing techniques Digital forensics Build a Reputation Give out a good quality product, who are your customers? Internal Audit Report Report for the Insurance Carriers Legal Exhibits Think outside the box: Send out questionnaires to identify custom and practice versus policy and procedure Demonstrate Value Promote Results Calculate recoveries Audit Committee Assurance Consistent approach to managing Fraud Risk Anticipate & Overcome Obstacles Not easy to access Databases Improperly Staffed No budget Improperly positioned within the organization Lack of policies and procedures 41
42 Digital Forensic Investigation Fraud & Internal Audit
43 5. Digital Forensic Investigation - Context Context of Digital Forensics Definition: establishing facts based on digital evidence Typically refers to investigations of potential or known crime (including fraud), though broadly speaking many of the same concepts apply to any audit. For today s purposes, the most practical scope of discussion is occupational fraud - intentional misuse of financially related matters of employment for personal gain. Differs from other crimes outside the work environment (ex. romance scams ) or that do not result in gain (ex. denial of service) or are not financially related (ex. stealing a password to spy ). 43
44 5. Digital Forensic Investigation - Context Digital Forensics & Internal Audit While roles and responsibilities vary greatly amongst entities, the overlap between Digital Forensics and Internal Audit is generally: Evidence procedures related to fraud investigations Identity Theft (Information Security) Several factors challenge Internal Audit s role related to digital forensics: Trend from street to computer to online to mobile crime Lack of clear responsibilities related to fraud and forensics Senior Management is usually not well-informed on these risks Internal Auditors should be educated on fraud-related matters: 70% of computer-related malicious acts originate within (Gartner 2005) 30 60% of accounts no longer valid in large corporations (IDC) Big Data & Management s expectations of Internal Audit Forensic knowledge, tools, and processes should align with entity s risk. 44
45 5. Digital Forensic Investigation - Context Fraud Overview Economic Crime PwC Global Economic Crime Survey Cybercrime ( digital fraud ) #4 in most common reported economic crimes 48% experiencing crime in last year perceive rising cybercrime risks 40% say biggest fear is reputational damage from cybercrime 40% don t have capability to detect and prevent cybercrime 56% said the most serious fraud was an inside job Senior Execs. made up almost 50% who didn t know if a fraud occurred Source: Ref. 2 PwC GECS 45
46 5. Digital Forensic Investigation - Context Fraud Overview Internet Crime IC Statistics Total complaints received / reporting loss: 314k / 116k Total estimated loss: $485M Median dollar loss for those reporting a loss: $636 Average dollar loss for those reporting loss: $4,187 Source: Ref. 3 IC3 ICR Source: Ref. 3 IC3 ICR 46
47 5. Digital Forensic Investigation - Techniques Investigation Process The investigative process is iterative. Digital forensic techniques can assist in each phase. COMMUNICATE Investigation Team, Management Report, Lawyers, Police / Court HYPOTHESIS Scenario / Scheme, Investigation Request EVIDENCE Identification, Collection, Validation A successful investigation depends on evidence that clearly links from hypothesis to communicated conclusion. ANALYSIS Compare Evidence vs. Hypothesis Do facts lead to a conclusion? 47
48 5. Digital Forensic Investigation - Techniques Hypothesis & Evidence Identification Evidence to be collected and associated techniques depend on how well the hypothesis is initially formed. Targeting: Known issue & source - Bullseye approach emphasizing facts, evidence preservation, and clear results - Consider the cost / benefit Sourcing: Known issue and unknown source - Brainstorm and profile considering facts, schemes, flags, and controls - Follow the cash and audit trails Exploring: Determining whether any issue exists - Analyze risks top-down and bottom-up, be adventurous and discrete - Use CAATs to assess risks across populations If litigation is a possibility, start documenting evidence chain and custody. Consult with internal & external experts if your task is greater than your means. 48
49 5. Digital Forensic Investigation - Techniques Evidence Collection - Hardware Acquiring data from hardware may require different methods depending on data state and the many possible storage forms Computer Media: drives, RAM, CDs, DVDs, flash drives Mobile devices: phones, PDAs, ipods, GPS Network Infrastructure: printers, servers, O/S, AD, databases, and logs Cloud : Apple icloud & MobileMe, Amazon S3, Google Cloud Storage Analyze the state of hardware and data before interacting, and never power down hardware before collecting temporarily stored data. Ideally hardware should be collected in-state and transported to secured, pristine environment for analysis. Acquired hardware requires validation for completeness and accuracy similar to data validation. 49
50 5. Digital Forensic Investigation - Techniques Evidence Collection - Data Create a visual diagram to identify, track, and communicate data analysis Be sure the source is authoritative / appropriate. Validate any data collected or transferred for completeness and accuracy. Metadata can serve as audit trail, though may need to be validated / corroborated. Deleted data predominantly is not really deleted, though specialized tools may be necessary. 50
51 5. Digital Forensic Investigation - Techniques Evidence Collection Beyond Technology Digital evidence is only one piece of a bigger puzzle, and evidence in total must corroborate. Never forget about the human element. People commit fraud using technology, not technology using people. Interviewing, body language, and writing (handwriting, s, letters, etc.) analysis are there own disciplines for a reason. Expertise should be analyzed and sought out before approaching these topics. Bullseye make every effort not to approach the suspected fraudster until sufficient evidence proves the assumption (know when to hold em). 51
52 5. Digital Forensic Investigation - Techniques Analysis - Basics Basic analysis techniques Understand the data context (do your homework) Aggregate financials, # of employees / locations, hard drive size, # of files / records, etc. Statistical analysis stratification, classification Look for anomalies mining, regression analysis, gaps, duplicates, Benford s, time period comparisons, unusual transaction attributes, etc. Consider lookups / cross-references (especially for shell schemes) Carefully consider whether population or sampling analysis is appropriate Continuously asses how analysis relates to known facts, profile, etc. Conduct analysis with thought of how results may be communicated. Analysis should be recorded with the same rigor as evidence collection. 52
53 5. Digital Forensic Investigation - Techniques Analysis Intermediate Designing and executing analysis from the view of the hypothesized fraud scheme / red flags can effectively identify and analyze data. As examples: Asset Misappropriation Schemes Segregation of duties in bank statement receipt and reconciliation Rotating duties or mandating vacation for key employees Examining all types of transactions just under required review/approval level, and classifying them by employee, vendor, and/or customer Reconciling inventory and confirming receivables regularly Billing - Shell Vendor Schemes Sorting payments by vendor, amount, and invoice number for anomalies to investigate Examining charges in largest expense accounts Verifying service-only vendors invoices Using CAATs to cross-reference employees addresses with vendors addresses Payroll - Ghost Employee Schemes Reconcile employees / SSNs in payroll file with those in human resource (HR) database. Rotate duties of handling printed checks or require vacation timed with payroll Data mining payroll data for post office box, physical address matches that of another employee (i.e., a duplicate ), direct deposit account number that matches that of another employee, missing phone number or a phone number that matches either another employee or a work phone, compare dates of paychecks compared to termination dates, employees who have no deductions from paychecks 53
54 5. Digital Forensic Investigation - Techniques Analysis Advanced Establish the fraud scenarios for ongoing / continuous monitoring Build and document understanding around related systems and data Ensure adequate understanding of underlying business, processes and controls Document flow and mapping of system architecture, applications, interfaces and data structures Build inventory of procedures given scenarios and systems understanding Tools like ACL can retain procedures through logs or scripts Integrate results by communicating to related Internal Audit and other risk management functions 54
55 5. Digital Forensic Investigation - Techniques Communicate Evidence has to corroborate each other (fit with the profile, scheme, initial facts, etc.) or be explained as to why it does not corroborate. Differentiate facts and opinions, and be transparent with any assumptions. Demonstrate how evidence and analysis clearly lead to results. Play devil s advocate... If the case goes to trial, anything can be questioned and possibly sway the outcome. 55
56 5. Digital Forensic Investigation - Tools Forensic Investigation Tools Wikipedia Listing of Tools: Investigation Processes EnCase - data acquisition, analysis / workflow, preservation, & reporting: Symantec & Norton Ghost - disk imaging: Paraben Mobile Forensics: Investigation and Data Analysis Platforms Sleuth Kit - system / file data acquisition and analysis tool with various O/S and data file interoperability and user-defined C language scripting Picalo - system / file analysis tool with various O/S and data file interoperability, open source (Python*) script community, no record size limit 56
57 5. Digital Forensic Investigation - Tools Data Analysis & Search Tools Data Analysis ACL - Desktop - "traditional" data analysis tool with various file interoperability, built-in analysis functions, and custom-language scripting / automation abilities Exchange - data feeds, functions with custom parameters, documentation acquisition and storage, Microsoft Office integration, and data exception identification and workflow Acerno - Excel Add-In for results analysis IDEA - Data analysis tool with various file interoperability, built-in functions, and custom-language scripting / automation ActiveData / ActiveAudit - Excel Add-Ins for data analysis similar to IDEA and ACL Search Websites Craigslist / Ebay search: Person or Company profiling: Address or Phone search: Social Media search: Blog Search: Whois search: 57
58 5. Digital Forensic Investigation - Tools Cyber Crime & Identity Theft Tools 58
59 References & Resources ACFE 2012 Report To The Nation (RTTN) - PwC 2011 Global Economic Crime Survey (GECS) - Internet Crime Complaint Center (IC3) 2011 Internet Crime Report - PwC 2004 The Emerging Role of Internal Audit in Mitigating Fraud and Reputation Risks. Mitigating Business Risk Example of Anti Fraud Framework from the Australian Standard on Fraud and Corruption Control, AS Grant Thornton Managing fraud risk: The audit committee perspective Local Forensic Firms Forensic Strategic Forensic CPAs - Financial Forensic & Valuation Group
60 Open Discussion 60
61 Fraud and Internal Audit: Current Views, Examples, and Resources Institute of Internal Auditors, Birmingham Chapter September 2012
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
Fraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner [email protected] 210.268.1932 AGENDA
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner [email protected] 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control
September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value
1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE
FRAUD RISK MANAGEMENT PROGRAM SHERYL VACCA SENIOR VICE PRESIDENT AND CHIEF COMPLIANCE AND AUDIT OFFICER MIKE JENSON UCR AUDIT DIRECTOR SESSION OBJECTIVE AND OUTLINE Assist campus managers in the development
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Fraud Risk Management and Internal Audting
Fraud Risk Management and Internal Audting Waheed Alkahtani CFE and CCEP-I Saudi Aramco Internal Auditing Special Audits Division Copyright 2015, Saudi Aramco. All rights reserved. February 2015 What do
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING A CaseWare IDEA Research Report CaseWare IDEA Inc. is a privately held software development and marketing company, with offices in Toronto
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
FRAUD RISK & INTERNAL AUDIT
FRAUD RISK & INTERNAL AUDIT ACFE & November 12, 2014 Mark P. Ruppert, CPA, CIA, CISA, CHFP, CHC, ACS, Director, Internal Audit Fraud Defined Fraud Risk Why Care / Why Assess Fraud Risk? What is Fraud Risk?
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
A Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
Fraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
Financial Services Group
Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be
How To Understand And Understand Forensic Accounting
Forensic Accounting and Investigations University of Texas at Arlington 14 August 2013 Overview What is Forensic Accounting? Definition and Services The Forensic Accountant History Roles Within Organizations
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
Ethics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
Assessment for Establishing a Whistleblower Hotline:
Report # 2012-01 Assessment for Establishing a Whistleblower Hotline: Establishing a whistleblower hotline could benefit the City by empowering employees to report fraud, waste and Establishing a whistleblower
For Private circulation only www.deloitte.com/in. Creative. Clear. Focused. Forensic Services
For Private circulation only www.deloitte.com/in Creative. Clear. Focused. Forensic Services Do you conduct background checks on employees and vendors? Do you educate employees about the importance of
Fraud and the Government Internal Auditor
Fraud and the Government Internal Auditor January 2012 Fraud and the Government Internal Auditor January 2012 Official versions of this document are printed on 100% recycled paper. When you have finished
Data Analysis: The Cornerstone of Effective Internal Auditing. A CaseWare Analytics Research Report
Data Analysis: The Cornerstone of Effective Internal Auditing A CaseWare Analytics Research Report Contents Why Data Analysis Step 1: Foundation - Fix Any Cracks First Step 2: Risk - Where to Look Step
FS Regulatory Brief. How the SEC s Custody Rule Impacts Private Fund Advisers. Introduction. The Custody Rule: An overview
How the SEC s Custody Rule Impacts Private Fund Advisers Introduction Under the Dodd-Frank Wall Street Reform and Consumer Protection Act (Dodd-Frank, or the Act ) and rules recently adopted by the Securities
7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?
From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations
A Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS European Security Conference & Exhibition Gothenburg, April 15, 2013 Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic Crime
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud
Sobel & Co. s Nonprofit and Social Services Group presents Your Organization is Vulnerable: The Facts About Nonprofits and Fraud Why Smart People Do Dumb Things If you are above average intelligence -
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA
Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Fraud-Related Compliance
Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments
B o a r d of Governors of the Federal Reserve System. Supplemental Policy Statement on the. Internal Audit Function and Its Outsourcing
B o a r d of Governors of the Federal Reserve System Supplemental Policy Statement on the Internal Audit Function and Its Outsourcing January 23, 2013 P U R P O S E This policy statement is being issued
Sample Financial institution Risk Management Policy 2011
Sample Financial institution Risk Management Policy 2011 1 Contents Risk Management Program...2 Internal Control and Risk Management Diagram... 2 General Control Environment... 2 Specific Internal Control
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:
1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org STAFF VIEWS AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN
Federal Bureau of Investigation s Integrity and Compliance Program
Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015. Torsten Wolf, CPP Head of Group Security Operations
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic Crime Landscape Economic
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Validating Third Party Software Erica M. Torres, CRCM
Validating Third Party Software Erica M. Torres, CRCM Michigan Bankers Association Risk Management & Compliance Institute September 29, 2014 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
Performing Fraud Risk Assessments
Performing Fraud Risk Assessments Presented by: Christy Decker & John Lefter, Sharp HealthCare Tuesday, April 15, 2014 Your Presenters Christy Decker is the Vice President of Internal Audit Services at
TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
White Paper: The Seven Elements of an Effective Compliance and Ethics Program
White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including
U.S. SQUASH Whistleblower Policy
General The United States Squash Racquets Association, Inc. d/b/a U.S. SQUASH ( U.S. SQUASH ) Ethics, Principles and Conflict of Interest Policy ( Ethics Policy ) requires directors, officers and employees
Leveraging Your ERP System to Enhance Internal Controls
July 2015 Leveraging Your ERP System to Enhance Internal Controls Public Sector Entities By Melinda J. DeCorte, CPA, CFE, CGFM, and Jeanne M. Owings, Principal Audit Tax Advisory Risk Performance Even
ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
How To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
A Publication of the Center for Audit Quality
Practice Aid for Testing Journal Entries and Other Adjustments Pursuant to AU Section 316 A Publication of the Center for Audit Quality December 8, 2008 1 Practice Aid for Testing Journal Entries and Other
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
Compliance and Ethics at the Federal Reserve Bank of New York
Compliance and Ethics at the Federal Reserve Bank of New York Operational Risk and Internal Audit Course Marina Adams, Compliance Officer and AVP David K. Clune, Compliance and Ethics Officer Kevin White,
BOARD OF EDUCATION OF BALTIMORE COUNTY OFFICE OF INTERNAL AUDIT - OPERATIONS MANUAL INTERNAL AUDIT OPERATIONS MANUAL
BOARD OF EDUCATION OF BALTIMORE COUNTY INTERNAL AUDIT OPERATIONS MANUAL BACKGROUND The Office of Internal Audit Operations Manual was developed to be used as a guide and resource for the Office of Internal
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
Neil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
Modalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
a. employees Company; or
Code of Busines ss Conduct and Ethics 1. Introduction a. This Code of Business Conduct and Ethics (the Code ) applies to all directors, officers, employees and third parties employed or directly engaged
Fraud Policy FEBRUARY 2014
Fraud Policy FEBRUARY 2014 TABLE OF CONTENTS 1. Application of Policy... 2 2. Purpose of Policy... 2 3. Fraud Policy... 2 4. Definition of Fraud... 2 5. Duties and Responsibilities of an Employee or Contractor...
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
6 TH ANNUAL JOINT ACFE & IIA FRAUD CONFERENCE The Whistleblower Programs. April 17, 2015. Presented by:
6 TH ANNUAL JOINT ACFE & IIA FRAUD CONFERENCE The Whistleblower Programs April 17, 2015 1 PRESENTER MARCIA NARINE COMPLIANCE ADVISOR Marcia Narine serves as Compliance Advisor for MDOPartners. She is also
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
WHISTLE BLOWING POLICY & PROCEDURES
Management Circular No: GCSL/01.2013 Revised: 01/2014 WHISTLE BLOWING POLICY & PROCEDURES All rights reserved. No part contained in this Policy may be reproduced or copied in any form without the written
INTERNAL AUDIT MANUAL
དང ལ ར ས ལ ན ཁག Internal Audit Manual INTERNAL AUDIT MANUAL Royal Government of Bhutan 2014 i i ii ii Internal Audit Manual དང ལ ར ས ལ ན ཁག ROYAL GOVERNMNET OF BHUTAN MINISTRY OF FINANCE TASHICHHO DZONG
Glossary 2. About this chapter 3. 7.1 About fraud and corruption prevention and control 4
Contents Glossary 2 About this chapter 3 7.1 About fraud and corruption prevention and control 4 7.1.1 How to use this toolkit 5 7.1.2 What is fraud and corruption? 6 7.1.3 The Australian Standard AS 8001:2008
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
