PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
|
|
|
- Arthur Sims
- 10 years ago
- Views:
Transcription
1 IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence. Corporate frauds are not going away any time soon, and the traditional role of auditor is being expanded to assist in fraud detection, investigation, and prevention. This presentation will teach you what to consider when there is a potential fraud discovered, what other elements need to be considered moving forward, additional tests to be conducted, and how to preserve evidence. FRANSISKUS OEY Group Managing Director The Prodigy Group Singapore Fransiskus Oey is an experienced player in the audit and fraud detection and prevention fields, and has conducted over 12 years of training and workshops on ACL data analytics, continuous monitoring, and fraud detection and prevention across the Asia and Middle East region. His interests include data forensic analysis and fraud detection techniques. He devotes a substantial portion of his time in research works and plays an active role in creating awareness on the importance of continuous monitoring for audit productivity, business process improvement, and fraud prevention to corporations. He has conducted various specialised workshops on the fraud detection and prevention for banks, retails, manufacturing, and telecommunication companies, as well as educational institutions. Mr. Oey was one of the first ACL Certified Trainers in the Asia region, and is also an active member of the Information Systems Audit and Control Association (ISACA), Association of Certified Fraud Examiners (ACFE), and the Association of Certified Anti- Money Laundering Specialists (ACAMS). Mr. Oey s core competencies include Business Process Improvement, Business Continuity Planning, Business Assurance Implementation, Continuous Monitoring, Fraud Prevention and Detection, Anti-Money Laundering, and Operational Risk Management. He has worked with major corporations in the banking and finance, insurance, investment, government, manufacturing, and many other diversified industries in the Asia region. Association of Certified Fraud Examiners, Certified Fraud Examiner, CFE, ACFE, and the ACFE Logo are trademarks owned by the Association of Certified Fraud Examiners, Inc. The contents of this paper may not be transmitted, re-published, modified, reproduced, distributed, copied, or sold without the prior consent of the author. 2011
2 Introduction Fraud is always intentional as contrasted to errors and misrepresentations that are unintentional by chance or lack of training or skill. Challenges Different vulnerabilities at different stages of the business process Differentiating fraud transactions from error transactions in digital domain of organisation system network Lack of robust, scalable, and near real-time preventive tools Implementation steps Automation vs. manual prevention/detection Auditors' New/Value-Adding Roles Fraud deterrence for internal auditors requires action to discourage the perpetration of fraud and limit the entity s exposure to fraud. If fraud does occur, the internal auditor should help in its investigation and deter fraud by examining apparent control system weaknesses and establishing procedures to limit the entity s exposure to future risk. Specifically, the internal auditor is supposed to determine that: The organisational environment fosters control consciousness. Realistic organisational goals and objectives are set. Written corporate policies (a code of conduct) exist and describe prohibited activities as well as action required upon the discovery of violations. Appropriate authorisation policies for transactions are established and maintained
3 Policies, practices, procedures, reports, and other mechanisms to monitor activities and safeguard assets, particularly in high-risk areas, are developed. Communication channels provide management with adequate and reliable information. Recommendations are made for the establishment or enhancement of cost-effective controls to help deter fraud. Fraud detection consists of identifying fraud problems that warrant an examination. These potential fraud problems may be indicated by the control system established by management, tests performed by internal or external auditors, or other sources, such as customers and employees. Examples of fraud indicators: Unauthorised transactions Override of internal controls Unexplained accounts or transactional document exceptions (such as pricing exceptions) Personal characteristics (mood changes in employees or management) Motivations of management
4 Cost of Fraud Reputation for integrity is one of the most valuable assets of an organization. While compliance reporting mandated by government legislation sets baseline standards, a reputation for integrity remains one of the most valuable assets of a financial institution. Failure to take the necessary steps to detect and prevent financial transactions supporting criminal or terrorist activity may result in stiff fines, criminal charges, and negative publicity. Action plan for detection and prevention control. Evidence of non-compliance can irreparably damage a financial institution s reputation with customers, regulators, and shareholders, and present a serious challenge to continued viability. Prevention is better and cheaper than investigation. The cost/investment for prevention is lower than cost of investigation. Furthermore, the whole
5 process of investigation can be very stressful and lengthy. Simplified Analytic Capability Model The traditional approach to audit has always been to take a historic or retrospective view of what has happened over a period of time. While this approach delivers necessary and proven hindsight for audit planning, today s environment demands a more proactive and comprehensive view for effective risk management and business assurance. (Level 1) General Purpose Current state: Limited to no use of data analysis software Use of spreadsheets for sampling/light analysis Data access is manual and delayed No integration of data analysis in audit process Desired state is Level 2: Ability to analyze 100% of transactions Staff trained on data analysis software
6 Knowledge of where to apply data analysis (Level 2) Specialized Current state: Designated individual(s) using data analysis software to analyze 100% of transactions Some access to data, but used inconsistently Decentralized, unsecure environment Desired state is Level 3: Centralized, secure environment with sharing of data, etc. Repeatable and sustainable use Knowledge of how to integrate more data analysis (Level 3) Managed Current state: Centralized, secure environment and able to share audit content Data access is controlled and managed Data analysis still manual Desired state is Level 4: Automate controls testing Gain deeper insight into key risk areas more frequently (Level 4) Automated Current state: Automated control tests are in place Able to easily develop and deploy additional control tests Infrequent and unstructured communication of exceptions to the business Desired state is Level 5:
7 Continuous assurance automated controls, exceptions resolved Monitoring all key business processes Develop a risk-based audit plan (Level 5) Monitoring Current state: Continuous assurance Continuous monitoring of key business processes Exceptions routed to appropriate business process owners for resolution Able to identify and plan future areas of risk coverage Demonstrate to senior management a view of organizational risk Growing Concerns Regional and global economy is converging; many organisations are dealing with both regional and global customers and suppliers. Mergers and acquisitions are adding more business opportunities as well as business risks that auditors need to quickly identify and monitor. Advancement in the use of computerised systems for business operations. These new systems might not integrate properly with the current system in place, as so more due care is needed. Also important to note that during system migration to a new system, auditors should use Computer Aided Audit Tools (CAATs) during this phase to verify that data from the previous system is correctly migrated to the new system. Stakeholder expectations and requirements: Increased requirement for new regulatory compliance based on location, and industries types of the organisation from:
8 Stock exchanges Federal government State government Auditors are playing important role in protecting shareholders interest, as such 100% audit analysis of the data is very critical to provide better accuracy into organisational performance and compliance. There are also increasing public expectations of how organisations should conduct their business in terms of good corporate governance, environmental preservation, ethical business culture, etc. However, all these require additional resources, and auditors are overwhelmed as it is. Thus, without relying on technology for CAATs it will be close to impossible for auditors to perform efficiently. Why is it important? Recent economic crisis, the worst since The Great Depression Many organisations still have poor risk management Finally, more have recognised the importance of IA in identifying and mitigating risks Governments and general public are demanding better corporate governance of businesses, as: Corporate frauds are continuing to increase The penalty associated with an FCPA infraction has grown tenfold in the past few years Wastages and inefficiencies (revenue leakages) Half of companies (and growing) with over 1000 employees are not taking full advantage of available vendor discount terms by paying their invoices within a set timeline (source: Institute of Management and Administration, IOMA 2007) The cost of a company missing on a 1% discount on a quarter of its payments amounts to
9 $250,000 for every $100 millions. On the other hand, repayments too early may lead to cash flow problems (source: IOMA 2007) Errors Companies lose about 0.5% in duplicate payments; however, this amounts to $500,000 for every $100 million in payments made (source: IOMA 2007) Error rates in excess of 5% of T&E expenditures are reported by 40% of companies (source: IOMA 2007) 4.6% of invoices contain errors and 44% of companies pay without original invoices (sources: IOMA 2007) Fraud 85% of companies have been hit by corporate fraud in the past three years, up 80% from the previous year s survey (source: Kroll Global Fraud Report 2008) An increase of 22% of an average company s losses to fraud from 2007 to The average business lost $8.2 million to fraud during the past three years, compared with a loss of $6.7 million the previous year (source: Kroll Global Fraud Report 2008) $994 billion is the estimated total of U.S. occupational fraud and abuse in 2008 $835 billion is the total losses that were never recovered The amount employees around the world are pocketing every year in fake expense claims is 6 billion (source: Global Expense Survey)
10 Using CAATs for Audit Vs. Fraud Prevention Auditors may find the potential fraud, but many are not able to build the modus operandi, so first of all they need to understand a few fundamentals: Business Environment RELATIONSHIP AND MONITORING OF ALL THE BUSINESS ENVIRONMENTS Process is looking at internal controls. Basically, it is the policies and procedures of the organisation that provide some reasonable assurance that the compliance and control objectives are achieved. Technology is looking at the different systems that are available in the organisation. How do you monitor and analyse these data from disparate systems? People are the most complex environment of the three. People s integrity can change, especially when there is opportunity for them to commit fraud
11 UNIFORM OCCUPATIONAL FRAUD CLASIFICATION SYSTEM - ACFE This is a very good table to classify the different types/categories of occupational fraud; three main classifications with examples of questions that auditors should ask themselves on which area of potential fraud they want to start with the analysis: Corruption Is there conflict of interest between the staff and the customers/vendors/suppliers? Is there collusion to disadvantage the company between staff and the customers/vendors/suppliers? Is the company facing cash flow issues? (Might want to check on early repayment of payables) Asset misappropriation (generally lower in value but higher in volume) Ghost employees? Cash register s end-of-day balance does not tally with the stock on hand? Purchases of resources/inventory do not tally with the purchase trend (are the resources/inventory being skimmed away)?
12 Any anomalies in the expense claims (duplicate claims, dubious expenses, and claims while on holiday)? Fraudulent statements (generally lower in volume but higher in value) Is the revenue recognition timing adhering correctly? Is management dominated by a single person or a small group (is there sufficient segregation of duty policy in place)? Does management display a significant disregard for regulations or controls? Has management restricted the auditor s access to documents or personnel? Has management set unrealistic financial goals? Does management have any past history of illegal conduct? Has that employee s lifestyle or behaviour changed significantly? The Technology The CAATs software that will be familiar to auditors are ACL and IDEA. While there are others, none are as mature as these two softwares in the current time. The characteristics of the software that you are looking for should consist of: Very fast processing speed Interrogates data 100% of the data, no sampling required Log files provide required audit trail of activities Ability to create multiple log files to separate audit from fraud investigation Ability to upload evidence (documents, pictures, audio, data files, etc.) See below for example:
13 Automation can be built to provide a systematic analysis, from data access, verification, and analysis, to reporting Secure knowledgebase retention The Techniques Preparing for investigation requires a lot of planning. However, before auditors jump into a conclusion that they have uncovered fraud, they should firstly initiate investigation predication model as shown in the diagram below to determine if this is a potential fraud or is it just an error
14
15 Preparing for investigation is initiated once the above predication is completed and results points to possible fraudulent activities, then auditors can begin their planning of fraud investigation. Set context or parameter (risk-based). Define indicators of fraud. Determine the presence of elements that make up the fraud, for each indicator. Identify the required sources of information. Obtain the data required for analysis. Ideally it should be original/raw format data (no conversion). Identify the people that should be involved in the investigation team. Assigning appropriate roles to appropriate individuals is central to success of the investigation. The team need to then study the business environment of the business process carefully. Building a flowchart will greatly help in visual clarification of the process. See diagram below for example:
16 From flowchart, auditors can further evaluate these questions: What is the fraud being committed? Who might be involved? Which systems can the evidence or indicators be found? When did it occur? How has the fraud been committed and for how long? Analytical tests that can be performed to identify potential fraud: Purchases, payments, and payables Duplicate payments Early repayments Others Analyse and age A/P Analyse and combine payables for external auditors Audit paid invoices for manual comparison with actual invoices Correlate vouchers or invoices posted versus purchase order amounts Create activity summary for suppliers with duplicate products Extract invoices posted with duplicate purchase order numbers Extract total posted invoices for the year for accurate vendor rebates Generate cash requirements by bank, period, product, vendor, etc. Identify credits given before discount terms of payment days Identify distributions to accounts not in suppliers account ledgers Isolate vendor unit price variances by product, over time Reconcile cheque register to disbursements by vendor invoice Reconcile selected vendors payables posted against purchase orders
17 Report on cheque disbursements for unrecorded liabilities Report on selected vouchers for manual audit or examination Review recurring monthly expenses and compare to posted/paid invoices Summarise large invoices without purchase orders by amount, vendor, etc. Travel and entertainment Duplicate claims Dubious claims Travel claims during period when staff is on vacation or sick leave Salaries and payroll Compare and summarise costs for special pay, overtime, premium, etc. Report entries against authorisation records for new or terminated employees Extract all payroll checks where the gross dollar amount exceeds set amount Identify changes in exemptions, gross pay, hourly rates, salary amounts, etc. Summarise and print payroll by selection criteria for general review Identify duplicate or missing payroll checks by check, bank, etc. Summarise payroll distributions for reconciliation to general ledger Common CAATs analysis commands that can be applied onto the data: Calculation of statistical parameters such as averages, standard deviations, highest and lowest values, which are used to identify statistical anomalies Classifications to find patterns and associations among groups of data
18 Stratifications of numeric values to identify unusual and outlying values Digital analysis, using Benford s Law, to identify statistically unlikely occurrences of numeric amounts Joining or relating of data fields between disparate systems, typically looking for expected matches or differences for data such as name, address, telephone, part or serial number Sounds like function that identify fraudulent variations of valid company and employee names Character Day of Week function that convert date fields into weekdays and weekends to identify suspicious transactions Duplicates testing to identify simple or complex combinations of duplication Gaps testing that identifies missing sequential data Summing and totals to check control totals that may be falsified Graphing to provide visual identification of anomalous transactions Conclusion Use powerful CAATs software that provides simplified access to all of an enterprise's data and transactions in any structure or format & not just sampled data. Ideally, use the software that allows evidence preservation and robust analytics. Assess if it is a potential fraud or is it just an error using the initiating investigation predication model. Build up a fraud team, and they should consist of other people outside of the audit, such as the corporate lawyers, fraud investigation specialist, etc
19 Build a fraud plan, with detailed flowchart of business process to help identify the perpetrators; system and which process that have been exploited by the frausters. Fraudsters often seek out interfaces between computer systems, knowing there may be little or no cross-system validation. Getting access to raw/original data format is paramount for fraud investigation to reduce the potential conversion error of data conversion. If the raw/original data format is not accessible, then a data verification test needs to be conducted first to determine if there are conversion errors that could affect the investigation. Create early warning through continuous monitoring applications through automation for future fraud prevention. Create a fraud awareness culture
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER 2002 ACL Services Ltd. All rights reserved. AMWE109003 ACL and the ACL logo are registered trademarks of ACL Services Ltd. All
ACL EBOOK. Detecting and Preventing Fraud with Data Analytics
ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
Microsoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
Process Control Optimisation with SAP
Process Control Optimisation with SAP The procure-to-pay cycle, which includes all activities from the procurement of goods and services to receiving invoices and paying vendors, is a basic business process.
Internal Control Systems
D. INTERNAL CONTROL 1. Internal Control Systems 2. The Use of Internal Control Systems by Auditors 3. Transaction Cycles 4. Tests of Control 5. The Evaluation of Internal Control Component 6. Communication
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING A CaseWare IDEA Research Report CaseWare IDEA Inc. is a privately held software development and marketing company, with offices in Toronto
SPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
INTERNAL CONTROL POLICIES
INTERNAL CONTROL POLICIES 2701 Internal Control Policy 2701.1 Addendum Internal Control Standard #1 Payments Cycle 2701.2 Addendum Internal Control Standard #2 Conversion Cycle 2701.3 Addendum Internal
An Introduction to Continuous Controls Monitoring
An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc
Operational Risk Publication Date: May 2015. 1. Operational Risk... 3
OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...
CONTINUOUS CONTROLS MONITORING
Clarity. Certainty. Confidence. CONTINUOUS CONTROLS MONITORING Support Regulatory Compliance Improve Cost Management Drive Operational Performance Executives today are more challenged than ever to make
Complete Financial Crime and Compliance Management
Complete Financial Crime and Management With Oracle Financial Services Financial Crime and Management applications, financial institutions can manage compliance risk and investigate appropriate information
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES
FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely
Strategically Detecting And Mitigating Employee Fraud
A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection
San Francisco Chapter. Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young
Jonathan Shipman, Ernst & Young David Morgan, Ernst & Young Learning Objectives Understand how data analysis can impact/improve business Understand typical data analysis challenges Understand the various
The Informatica Solution for Improper Payments
The Informatica Solution for Improper Payments Reducing Improper Payments and Improving Fiscal Accountability for Government Agencies WHITE PAPER This document contains Confidential, Proprietary and Trade
SOLUTION BRIEF: CA IT ASSET MANAGER. How can I reduce IT asset costs to address my organization s budget pressures?
SOLUTION BRIEF: CA IT ASSET MANAGER How can I reduce IT asset costs to address my organization s budget pressures? CA IT Asset Manager helps you optimize your IT investments and avoid overspending by enabling
Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view
Enterprise-wide Anti-money Laundering and KYC Initiatives A point of view Introduction Every financial institution is charged with the responsibility of developing policies and procedures to combat money
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Guide to Internal Control Over Financial Reporting
Guide to Internal Control Over Financial Reporting The Center for Audit Quality prepared this Guide to provide an overview for the general public of internal control over financial reporting ( ICFR ).
TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL
TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL With the large volumes of data handled by organizations today, the ability to analyze this
How To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
Internal Controls Best Practices
Internal Controls Best Practices This list includes the most common internal controls applied by small to medium sized businesses to their operations. It includes controls that apply to the processes most
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER
KANSAS CITY, MISSOURI RESPONSES TO THE FISCAL YEAR 2013 AUDIT MANAGEMENT LETTER Material Weaknesses (0) No material weaknesses were reported for FY 2013. Significant Deficiencies (1) Grant Receivable Accounting
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
Performance Audit City s Payment Process
Performance Audit City s Payment Process January 2013 City Auditor s Office City of Kansas City, Missouri 18-2011 Office of the City Auditor 21 st Floor, City Hall 414 East 12 th Street (816) 513-3300
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Recognize the many faces of fraud
Recognize the many faces of fraud Detect and prevent fraud by finding subtle patterns and associations in your data Contents: 1 Introduction 2 The many faces of fraud 3 Detect healthcare fraud easily and
GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES
20 th February, 2013 To Insurance Companies Reinsurance Companies GUIDELINES ON RISK MANAGEMENT AND INTERNAL CONTROLS FOR INSURANCE AND REINSURANCE COMPANIES These guidelines on Risk Management and Internal
Fraud Workshop Finding the truth in the transactions
Your Trusted Partner for Audit Analytics Fraud Workshop Finding the truth in the transactions Copyright 2011 ACL Services Ltd. Robin Clough, ACDA ACL Certified Trainer Copyright 2011 ACL Services Ltd.
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Fraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
Product. AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance
Product AML Risk Manager for Life Insurance Complete End-to-End AML Coverage for Life Insurance A Comprehensive Solution for AML Detection, Investigation, Case Management and Reporting Illegal money laundering
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Chapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
Fraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
Combating Fraud on Corporate Checking Accounts
Combating Fraud on Corporate Checking Accounts A Bank of America White Paper One in a series of white papers prepared by Bank of America on key issues of interest to corporate treasurers. The information
Big Data Analytics Using CAATs
Big Data Analytics Using CAATs Date: 28 th 29 th January 2015 Time: 9.00am to 5.00pm Venue: Iverson Associates, Center Point Bandar Utama, Kuala Lumpur Big Data Analytics Using CAATs Big Data Analytics
Best Practices in Contract Migration
ebook Best Practices in Contract Migration Why You Should & How to Do It Introducing Contract Migration Organizations have as many as 10,000-200,000 contracts, perhaps more, yet very few organizations
Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010
Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 This report has been prepared on the basis of the limitations set
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
Achieve. Performance objectives
Achieve Performance objectives Performance objectives are benchmarks of effective performance that describe the types of work activities students and affiliates will be involved in as trainee accountants.
Kroll Ontrack Data Analytics. Forensic analysis and visualization of complex data sets to provide intelligence around investigations
Trade Date: 2013-08-14 11:57:00 Sum of Total Value: 287,663,728 Trade Date: 2013-08-14 11:51:00 Trader Name: Susan Wright Sum of Total Value: 443,382,018 Kroll Ontrack Data Analytics Trade Date: 2013-08-14
Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing.
Whitepaper Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing. June 2014 Overview Reducing costs, improving performance,
Neil Meikle, Associate Director, Forensic Technology, PwC
Case Study: Big Data Forensics Neil Meikle, Associate Director, Forensic Technology, PwC 6 November 2012 About me Transferred to Kuala Lumpur from PwC s Forensic Technology practice in London, England
National Australia Bank
Background In January 2004 the National Australia Bank (NAB) made the following three public announcements relating to losses from the foreign exchange options transactions: 13 January 2004 an initial
RISK MANAGEMENT & INTERNAL CONTROLS
RISK MANAGEMENT & INTERNAL CONTROLS RISK MANAGEMENT OPERATIONAL Loss arising from system failure, human error, or external events. Controls: segregation of duties, access control, authorisation & reconciliation
Monetary Authority of Singapore INSURANCE BUSINESS - INSURANCE FRAUD RISK
Monetary Authority of Singapore INSURANCE BUSINESS November 2007 GUIDELINES ON RISK MANAGEMENT PRACTICES FOR INSURANCE BUSINESS MONETARY AUTHORITY OF SINGAPORE TABLE OF CONTENTS 1 INTRODUCTION AND FUNDAMENTALS
A Publication of the Center for Audit Quality
Practice Aid for Testing Journal Entries and Other Adjustments Pursuant to AU Section 316 A Publication of the Center for Audit Quality December 8, 2008 1 Practice Aid for Testing Journal Entries and Other
Great Aycliffe Town Council. Purchase Ordering and Payment for Goods and Services Policy
Great Aycliffe Town Council Purchase Ordering and Payment for Goods and Services Policy Finance Section April 2013 1.0 Introduction 1.1 This policy sets out the Council s arrangements for ordering, receiving,
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
A Performance Audit of the State s Purchasing Card Program
REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU)
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU) CONTENTS 1. Introduction.. 3 2. Characteristics of Fraud.. 5 3. Fraud Strategy..... 6 4. Building the Fraud Prevention Plan........ 8 Fraud
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)
Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC) 1 Introduction 1.1 Section 316 (4) of the International Business
SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS EXAMINATION PROGRAM
7/30/07 SCHEDULES OF CHAPTER 40B MAXIMUM ALLOWABLE PROFIT FROM SALES AND TOTAL CHAPTER 40B COSTS Instructions: EXAMINATION PROGRAM This Model Program lists the major procedures and steps that should be
Fundamentals Level Skills Module, Paper F8 (IRL) 1 (a) Audit procedures procurement and purchases system
Answers Fundamentals Level Skills Module, Paper F8 (IRL) Audit and Assurance (Irish) December 2007 Answers 1 (a) Audit procedures procurement and purchases system Procedure Obtain a sample of e-mails from
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL
NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL I. Financial Planning/Budget Systems 1. Organization has a comprehensive annual budget which includes all sources and uses of funds for all aspects of
COMPLIANCE POLICY MANUAL
COMPLIANCE POLICY MANUAL FOREIGN CORRUPT PRACTICES ACT 07/24/2012 Policy Number 16-100 SUBJECT: FOREIGN CORRUPT PRACTICES ACT Application: Worldwide Strategic Business Units and Subsidiaries. It is the
INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS
Cabinet Member or Representative responsible for completing this form: INSTRUCTIONS FOR COMPLETING THIS FORM: Answer each question by placing an X in the either the Yes, No,, or Applicable () column. Provide
Data analysis for Internal Audit
Data analysis for Internal Audit What is Data Analytics Analytics is the process of obtaining an optimal or realistic decision based on existing data. Wikipedia Data analytics is the science of examining
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls
Course Name: Internal Auditing & Controls Module: 5 Module Title: Examination phase of the internal audit Lecture and handouts prepared by Chuck Campbell Examination phase of the internal audit Module
BUSINESS RELATIONSHIP OFFICERS REPORTING TO: RELATIONSHIP MANAGER
Guaranty Trust Bank Uganda is one of the leading banks in Africa. They acquired a 70% stake in the Fina Bank group in to enable them enter the East African market. As they expand their operations in the
Fundamentals Level Skills Module, Paper F8. Section A
Answers Fundamentals Level Skills Module, Paper F8 Audit and Assurance June 2015 Answers Section A Question Answer See Note 1 D 1 2 C 2 3 A 3 4 D 4 5 C 5 6 B 6 7 C 7 8 B 8 9 A 9 10 A 10 11 B 11 12 D 12
Internal Controls and Financial Accountability for Not-for-Profit Boards NEW YORK STATE OFFICE. of the ATTORNEY GENERAL.
Internal Controls and Financial Accountability for Not-for-Profit Boards NEW YORK STATE OFFICE of the ATTORNEY GENERAL Charities Bureau 120 Broadway New York, NY 10271 (212) 416-8400 www.charitiesnys.com
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
Integrated email archiving: streamlining compliance and discovery through content and business process management
Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........
Data Analysis: The Cornerstone of Effective Internal Auditing. A CaseWare Analytics Research Report
Data Analysis: The Cornerstone of Effective Internal Auditing A CaseWare Analytics Research Report Contents Why Data Analysis Step 1: Foundation - Fix Any Cracks First Step 2: Risk - Where to Look Step
ACFE FRAUD PREVENTION CHECK-UP
One of the ACFE s most valuable fraud prevention resources, the ACFE Fraud Prevention Check-Up is a simple yet powerful test of your company s fraud health. Test fraud prevention processes designed to
