Accounts Payable Fraud Services

Size: px
Start display at page:

Download "Accounts Payable Fraud Services"

Transcription

1 Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In response to this growing problem, Automated Auditors, LLC () has developed a suite of algorithms that identifies potential Accounts Payable (A/P) fraud. Typically, we import various tables from your A/P system (A/P, vendor table, employee table) into our proprietary software suite, customize the algorithms to your data, run the algorithms, refine the output, and write a final recommendations report which highlights the vendors we feel are the most abnormal and in need of further research. The graph below depicts our process: PROCESS FLOW DIAGRAM 1 Christy Warner Page 1

2 Description of Algorithms Duplicate Payments Duplicate payments are often mistakes in payment: perhaps an invoice was paid via check and wire, or via check and procurement card. But, sometimes duplicate payments can indicate fraud. A fraudulent employee may create a duplicate payment and alter the second check and cash it. We typically run the following duplicate payment algorithms, but if additional data is presented, we utilize it to maximize findings (such as service entry sheets). We use FUZZY-MATCHING logic to remove false positives. Fuzzy-matching is a method of detecting if two text-strings are similar to each other. For example, our software can tell Christy Warner Page 2

3 that the following two invoices are similar because they have the same primary root number: RE Fuzzy-matching is also used to identify amounts that are similar. We identify if amounts are: 3% +/- one another half of one another sum of 2 invoices = 1 other...for example: invoice A $280,000 invoice 1234B $180,000 invoice C $100,000 Duplicate Vendors Duplicate vendor numbers for the same vendor can exist legitimately in any A/P operation, i.e. when you have different locations or one is a billing address and the other is a geographical address. Then there are the mistaken entries where an A/P staff member erroneously created a second (or third!) vendor number. Then there is FRAUD: when an employee purposely creates another vendor id to funnel payments to him or herself, using the same address or banking information. Or perhaps it's an outside job where the vendor is fictitious and they have set up multiple operations and are billing you from different directions. Whatever the cause - we have the tools to find your duplicate vendors. Using the power of fuzzy-matching logic, we analyze the following fields (and more if you have more) to determine if vendors are duplicate records: Christy Warner Page 3

4 Procurement Card Analysis Our staff has experience working with Procurement Card (P-Card) data and specifically identifying overpayments and potential fraud perpetrated using P-Cards. Below is a list of the algorithms we typically run: Duplicate payments within the Procurement Card data. We will run as many duplicate payment algorithms as is feasible with the data provided. Duplicate payments: 1 from A/P and 1 from P-Card. Sometimes, purposely or mistakenly, an employee uses the P-Card and in addition, submits a reimbursement request such as for travel, resulting in a duplicate payment. Automated Auditors uses fuzzy-matching algorithms to compare transactional information, which is useful if there exists no real "link" between the A/P data base and the P-Card data base. We can merge by name or an ID if there is one (such as an employee ID) or also by date/amount combinations to identify potential duplicates. Identification of sequential transactions to highlight split purchases ($5,000 over 5 days of $1,000 each to fly under the radar), both per employee and across multiple employees. Sometimes multiple employees will collude and purchase items that are above the maximum (i.e. $3,000 is a common max threshold) and "split" the purchase between them so it gets approved. They can then take turns purchasing things by this splitting method. Summary information of Procurement Card data to aid management in making decisions, with specific focus on the highest and most frequent P-Card users. If data are sufficient, conduct detailed analysis on P-Card data, ideas include to compare daily purchase amount with item(s) purchased. Fraudulent employees Christy Warner Page 4

5 will often fold their receipts up before faxing in, so it appears they only purchased 1 item, when in fact, they have bought several personal items. It is easy to go undetected without a 100% data investigation. Benford's Law Benford's Law is a hot buzzword in the fraud-detection world. But what does it do? Benford's Law is a logarithmic phenomenon whereby the first digit of a continuous amount (such as invoice amount) is "1" a little over 30% of the time. We have personally tested this theory out with numerous large datasets and it always holds true. For fraud detection, this means we can identify vendors who are perhaps billing amounts that start with "8" or "9" a lot more frequently than their peer-groups. Rounded Amounts Another tool in our toolbox is to identify vendors who are consistently using rounded amount checks (no pennies). Our analysis identifies both low- and high-volume vendor behavior because sometimes the vendor is a hit-and-run fictitious vendor and will just submit a couple of $5,000 invoices and no more. Another scheme is the 'below the radar' scheme where an employee may use a fictitious vendor number to consistently bill for, Christy Warner Page 5

6 say, $300 per week. Our approach identifies both schemes and weeds out false positives by gauging how far from the average the vendor is. Vendor/Employee Cross-Check This test is extremely useful for identifying employees who have created a vendor using their personal information. It is very similar to our duplicate vendor check, although we use the employee's information and cross-reference it with the vendor information. We typically compare the vendor and employee by address, phone, banking information, and weed out false positives where there was a valid travel and expense voucher for an employee. We also focus on situations where the vendor appears to be a Corporate Entity, with the same address or other information as the employee. This suggests that perhaps the employee created a fictitious vendor and is funneling funds to him/herself. Sequential Invoice Numbering Sequential invoice number is an abnormality because it indicates that the vendor does business with ONLY YOU. If they are legitimate, they most likely will have other clients. So we use this algorithm to determine if a vendor is billing with sequential invoice numbers, usually they start with "001", "002" and very low numbers and never have a gap. True, this can be legitimate, especially if the vendor tacks on some letters in front or after the number, perhaps meaning the invoice numbers are sequential just for your company and they have a separate scheme for other customers. Nevertheless, this is a great tool for identifying vendors that stray from the normal! Missing Checks This algorithm is used to identify missing checks/gaps in your check numbering. If checks are stolen, the gap may show up on this report and be invaluable to catching fraud as soon as it occurs. Checks Dated on Weekends and Holidays Christy Warner Page 6

7 In this age of "24/7" it is more common to work on the weekends. But to CUT CHECKS on the weekend is still rare, and even more rare on holidays. This algorithm identifies any checks cut on a Saturday or Sunday or a holiday in that year (we have a list of Federal Holidays recognized by the United States government and their dates in the past). Above Average Payments Using this algorithm, we identify way above-average payments per vendor by using a 'zscore' outlier detection method. The z-score is just a measure of how many standard deviations away from the vendor payment mean that a single payment is. This algorithm is most useful when combining it with some of the other algorithms, such as the Rounded Amount algorithm. Ask us how we found real fraud using this technique! P.O. Box It is common for a vendor to have a P.O. Box as their address, but somewhat less common for that to be the ONLY address you have on record for them. This program identifies vendors for which you only have a P.O. Box (no geographical location). To weed out false positives from this report, we split the report into how many digits are in the P.O. Box number. Why is this useful, you might ask? Large P.O. box numbers, such as "P.O. Box " are usually very large - and legitimate - commercial mail distribution centers, many of which are in Atlanta, GA. If we can isolate the vendors who have P.O. Boxes with, say, 2 or 3 digits, we are more likely to isolate the abnormal and potentially fictitious vendors. Mail Drop as Address Developed by Certified Fraud Examiner, Craig Greene ( this algorithm compares the vendor file with our proprietary and CURRENT list of mail drops across the United States. Our list includes: the UPS Store Mail Boxes, Etc (purchased by the UPS Store) Parcel Post Christy Warner Page 7

8 PakMail any other business categorized as a mail drop / mail box service This algorithm is instrumental in identifying potential fictitious vendors, because fraudsters may often use a mail drop as their "store-front" and have no actual physical location. Again - this behavior might be legitimate and the way we weed out false positives is to cross-check our findings on this report with all of the other reports (See Master Vendor List at the end of this document). Just Below Approval Levels This is the algorithm we nick-named "Flying Below the Radar" because that is exactly what the fraudster wants to do. Either by themselves, or via collusion with a manager with approval privileges, an employee may submit invoices that are just below common approval thresholds, such as $5,000, $10,000 and beyond. What are your approval thresholds? We will customize this algorithm to fit your approval thresholds and look for any payments that fall just beneath them. In addition - we look for vendors who exhibit this behavior CONSISTENTLY. Employee Travel and Expense (T&E) Analysis In this analysis, we focus on employees who exhibit strange travel and expense voucher/reimbursement behavior. By "strange", we mean: employees with an unusually high dollar amount total or per-event expense employees with unusually high frequency of T&Es employees with T&Es dated on weekends frequently employees with duplicate T&Es (especially duped with a procurement card) employees with T&E totals that violate any known policies at your company Master Vendor List Automated Auditors has been doing this business long enough to know that it does no good to give you a pile of lists, from which you have to cull out the good fraud leads. That is why we have developed the idea of a "Master Vendor List". The master vendor list Christy Warner Page 8

9 combines all of the alert lists into one. We do this several ways, but the easiest and most straight-forward is to just add up the number of lists that a vendor appears on. We typically "weight" some lists more than others, though. For example, we weight the "vendor/employee cross-check" list twice as heavily as other lists because this is a very good indicator of fraud. Below is a sample master vendor list, giving you an idea of how we combine the various lists into one shorter list: Christy Warner Page 9

10 Vendor Name Rounded amounts? Vendor/Employee Cross-Check? Mail Drop? Approval Levels? Total # of Lists ABC, Inc. YES YES YES YES 4 The AA Express YES YES YES 3 Ward & Long, PLC YES YES 2 MailServ Depot YES YES 2 The master vendor list will be easier to manage, and will help us and you identify suspect vendors more quickly. Christy Warner Page 10

by: Scott Baranowski, CIA

by: Scott Baranowski, CIA Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009 Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity

More information

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S. MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal

More information

Performance Audit City s Payment Process

Performance Audit City s Payment Process Performance Audit City s Payment Process January 2013 City Auditor s Office City of Kansas City, Missouri 18-2011 Office of the City Auditor 21 st Floor, City Hall 414 East 12 th Street (816) 513-3300

More information

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education

Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

Fraud Workshop Finding the truth in the transactions

Fraud Workshop Finding the truth in the transactions Your Trusted Partner for Audit Analytics Fraud Workshop Finding the truth in the transactions Copyright 2011 ACL Services Ltd. Robin Clough, ACDA ACL Certified Trainer Copyright 2011 ACL Services Ltd.

More information

Finding Fraud at a Fortune 500 Company

Finding Fraud at a Fortune 500 Company About Luminescent is a consulting firm based in Minneapolis, MN, focused on forensic accounting, governance and financial integrity. The firm has performed hundreds of forensic accounting engagements involving

More information

Accounts Payable Best Practices

Accounts Payable Best Practices Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can

More information

FREQUENTLY ASKED QUESTIONS ABOUT ACCOUNTS PAYABLE WHEN DOES THE STATE OF MARYLAND PAY MY VENDORS?

FREQUENTLY ASKED QUESTIONS ABOUT ACCOUNTS PAYABLE WHEN DOES THE STATE OF MARYLAND PAY MY VENDORS? FREQUENTLY ASKED QUESTIONS ABOUT ACCOUNTS PAYABLE WHEN DOES THE STATE OF MARYLAND PAY MY VENDORS? The state attempts to pay all vendors within 30 days of the Service Date. This is defined as the later

More information

Fraud Awareness Training

Fraud Awareness Training UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

Benford s Law and Digital Frequency Analysis

Benford s Law and Digital Frequency Analysis Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners

More information

Contract and Procurement Fraud. Vendor Management

Contract and Procurement Fraud. Vendor Management Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring

More information

How To Prevent Fraud In The United States

How To Prevent Fraud In The United States Fraud Detection & Prevention for Accounts Payable! Presented by Larry Holmes! Accounts Payable With Fraud! Paying for goods and services that were not received! Paying inflated prices for goods and services!

More information

Job Streaming User Guide

Job Streaming User Guide Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual

More information

Fraud Prevention Training

Fraud Prevention Training Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,

More information

Fighting Fraud with Data Mining & Analysis

Fighting Fraud with Data Mining & Analysis Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud

More information

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association

More information

Fraud Prevention: The Prevention and Detection of Fraud Begins with You

Fraud Prevention: The Prevention and Detection of Fraud Begins with You Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL

TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL With the large volumes of data handled by organizations today, the ability to analyze this

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

Fraud and internal controls, Part 3: Internal fraud schemes

Fraud and internal controls, Part 3: Internal fraud schemes Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

P-Card Fraud Controls. Introduction

P-Card Fraud Controls. Introduction Introduction According to 2013 Association of Financial Professionals (AFP) Payments Fraud and Survey, the second most targeted payment type for fraud was corporate/commercial purchasing cards. 29% of

More information

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71

Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71 Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes

More information

Preventing Duplicate Payments for Lawson Customers

Preventing Duplicate Payments for Lawson Customers White Paper Preventing Duplicate Payments for Lawson Customers By Brian Rosenberg, Senior Partner, RPI Consultants Duplicate Payments are far more common than most companies realize or are prepared to

More information

Purchasing Card Frequently Asked Questions

Purchasing Card Frequently Asked Questions Purchasing Card Frequently Asked Questions -Who is the office/department card administrator? This is typically the Administrative Assistant/Secretary of your office/department. It should be the person

More information

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D.

Conversion. Concealment methods. Example #1: Skimming. Example #2: Skimming. 2015 GASBO Conference. Thomas Buckhoff, Ph.D. Top Five Employee Fraud Schemes Forensic Solutions, LLC Forensic accounting and litigation support services Presented by: Thomas Buckhoff, Ph.D., CPA/CFF, CFE Fraudsters love cash! Cash is the asset most

More information

White Paper - Travel & Entertainment Spend Analytics Best Practices

White Paper - Travel & Entertainment Spend Analytics Best Practices White Paper - Travel & Entertainment Spend Analytics Best Practices T&E is probably your company s second largest discretionary expense, representing on average as much as 6% of all corporate expenses.

More information

Investigative Techniques

Investigative Techniques Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

PROPOSAL RESPONSE FORM Use Additional Sheets as Required

PROPOSAL RESPONSE FORM Use Additional Sheets as Required Erie 1 BOCES Financial Card Services (RFP # R-081513PC) PROPOSAL RESPONSE FORM Use Additional Sheets as Required 1. Please check the card services that your proposal includes: P-Card only A/P Card only

More information

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is

More information

City of Berkeley. Accounts Payable Audit

City of Berkeley. Accounts Payable Audit City of Berkeley Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior Auditor, CIA, CGAP Presented to Council

More information

PAYMENT FOR WORKS, GOODS AND SERVICES FINANCIAL PROCEDURE 11

PAYMENT FOR WORKS, GOODS AND SERVICES FINANCIAL PROCEDURE 11 CHIEF FINANCE OFFICER PAYMENT FOR WORKS, GOODS AND SERVICES FINANCIAL PROCEDURE 11 OWNER: HEAD OF FINANCIAL CONTROL Version 2.0 September 2014 FINANCIAL PROCEDURE PAYING FOR WORKS, GOODS AND SERVICES CONTENTS

More information

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,

More information

Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session

Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session Remote Deposit Capture: The Future of Check Processing BB&T Webinar March 28, 2007 Q&A Session Q. What types of checks are eligible for remote deposit capture? A. All checks drawn on US banks are eligible

More information

Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA

Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA Introduction to Fraud Examination World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed

More information

Duplicate Payments Analysis

Duplicate Payments Analysis Office of the City Auditor Report Duplicate Payments Analysis November 2010 Staff City Auditor: Laura L. Doud Assistant City Auditor: Deborah Ellis Deputy City Auditor: Janet Day Senior Auditor: Zadie

More information

A Performance Audit of the State s Purchasing Card Program

A Performance Audit of the State s Purchasing Card Program REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan

More information

KEY FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS

KEY FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS (KFI): A NEW APPROACH TO SET UP AND USE EFFECTIVE FRAUD INDICATORS Most companies set up key performance indicators (KPI), but when it comes to fraud, it is more difficult to find indicators that meet

More information

Cash Back FAQs on txu.com

Cash Back FAQs on txu.com Cash Back FAQs on txu.com Cash Back Loyalty Reward When will I get my cash back? You should receive your Cash Back Loyalty Reward before the end of February. Cash Back Loyalty Reward Can I pay my TXU Energy

More information

T&E Spend Analysis Report

T&E Spend Analysis Report T&E Spend Analysis Report Volume 1 Volume 1 Fall 2014 CORPORATE CARD 1234 5678 9876 5432 Executive Summary For this report Oversight analyzed over 10 million transactions, a total of over $1 billion dollars

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

The World of Invoice Approval & Payment. FREE ebook

The World of Invoice Approval & Payment. FREE ebook www.paymyinvoices.co.nz The World of Invoice Approval & Payment FREE ebook Supplier Invoices Approval & Payment Every business has invoices to be paid and there are a number of factors that can determine

More information

Data Analytics For the Restaurant Industry

Data Analytics For the Restaurant Industry Data Analytics For the Restaurant Industry 2014 Sunera Snapshot SAP ACL Copyright 2013 Sunera LLC. 2 About Our Speaker Matt Osbeck, CPA, CIA, ACDA Matt is a Senior Manager in the Los Angeles office of

More information

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent

Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth

More information

Achieving the Goals of Accounts Payable Automation. White Paper

Achieving the Goals of Accounts Payable Automation. White Paper Achieving the Goals of Accounts Payable Automation White Paper Contents Executive Summary... 2 The Manual AP Process... 2 Goals of Automation... 3 The Automated AP Process... 4 Measuring the Achievement

More information

Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes REMEDYNE Fraud Prevention Document Version: Rel. 1.4 2015-03-05 Continuous Audit and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS 1. SOLUTION

More information

Internal Controls, Fraud Detection and ERP

Internal Controls, Fraud Detection and ERP Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility

More information

OFFICE OF THE CITY AUDITOR

OFFICE OF THE CITY AUDITOR OFFICE OF THE CITY AUDITOR TO: THRU: FROM: DATE: SUBJECT: Mayor and Council Members Margaret Krym, City Auditor Kathy Magaw, Assistant Auditor~ September 27, 2013 Accounts Payable - Search for Duplicate

More information

Pay Your Vendors by Single-Use Credit Cards and Improve Your Cash Flow Management

Pay Your Vendors by Single-Use Credit Cards and Improve Your Cash Flow Management Pay Your Vendors by Single-Use Credit Cards and Improve Your Cash Flow Management By Shyam Kapoor Prisio Technologies LLC Introduction Consumers have been using single-use or a virtual credit card for

More information

BALDWIN COUNTY BOARD OF EDUCATION REGIONS PURCHASING CARD PROCEDURES OVERVIEW

BALDWIN COUNTY BOARD OF EDUCATION REGIONS PURCHASING CARD PROCEDURES OVERVIEW BALDWIN COUNTY BOARD OF EDUCATION REGIONS PURCHASING CARD PROCEDURES OVERVIEW The purchasing cards are a Regions Visa Card. An overview of the new process and the main features of the Regions Purchasing

More information

WHAT YOU SHOULD KNOW ABOUT MERGING YOUR PRACTICE

WHAT YOU SHOULD KNOW ABOUT MERGING YOUR PRACTICE WHAT YOU SHOULD KNOW ABOUT MERGING YOUR PRACTICE One night at dinner with his friend and colleague John, Bruce looks at him and says, we are both successful, good friends, cover for each other and trust

More information

White Paper. 10 Ways to Prevent Business Expense Fraud and Abuse

White Paper. 10 Ways to Prevent Business Expense Fraud and Abuse White Paper 10 Ways to Prevent Business Expense Fraud and Abuse The real impact of expense fraud Business expense fraud is a considerable issue across the world. According to a survey that Chrome River

More information

resource center/technology series

resource center/technology series resource center/technology series Accounts Payable Automation Technology: Procurement Cards The Perspective of a Practitioner By Craig Simpkins, CAPP The Institute of Financial Operations 615 East Colonial

More information

Citibank PROCUREMENT CARD GUIDELINES

Citibank PROCUREMENT CARD GUIDELINES Citibank PROCUREMENT CARD GUIDELINES 1 Outline Background 3 Items To Be Purchased With The Procurement Card 3 Items Prohibited From Procurement Card Use 4 Citibank Responsibilities 5 Establishing Accounts

More information

BUSINESS PROCESS (SAS 112 Compliance)

BUSINESS PROCESS (SAS 112 Compliance) Functional Area: Accounts Payable Name of Process: Payment of PO Invoices Purpose of Process: To liquidate encumbrances for purchase orders issued for goods and services on behalf Of the University. Primary

More information

B2B Payments New World

B2B Payments New World The Essentials of Procure-to-Pay Pay Patrick S. Lyons Vice President, Spend & Payment Solutions BMO Financial Group B2B Payments New World Trend: Payment Strategies now include all three Payments (ACH,

More information

Automated Vendor Form for Disbursement Voucher Vendors Instruction Manual

Automated Vendor Form for Disbursement Voucher Vendors Instruction Manual Automated Vendor Form for Disbursement Voucher Vendors Instruction Manual Table of Contents Eligible Vendor Types for Use with the Automated Vendor Form... 2 Search KFS for Vendors Before Using the Automated

More information

Office Supplies Purchasing Guidelines Degree Programs. January 2009

Office Supplies Purchasing Guidelines Degree Programs. January 2009 Office Supplies Purchasing Guidelines Degree Programs January 2009 Purpose To provide guidance on general office supply purchases within Degree Programs. Purchasing by PCard Example A: Buying office supplies

More information

Cure P2P Blind Spots with Expense Reporting Management Solutions

Cure P2P Blind Spots with Expense Reporting Management Solutions Cure P2P Blind Spots with Expense Reporting Management Solutions Capturing Competitive Advantage Featuring insights on...»» Current Market Trends in P-Card Usage»» Common Problems of P-Card Management»»

More information

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,

More information

FRAUD RISK ASSESSMENT

FRAUD RISK ASSESSMENT FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by

More information

DIXIE STATE UNIVERSITY PURCHASING CARD GUIDE

DIXIE STATE UNIVERSITY PURCHASING CARD GUIDE DIXIE STATE UNIVERSITY PURCHASING CARD GUIDE Introduction U.S. Bank VISA Welcome to the Dixie State University Purchasing Card Program. This program has been designed to allow for the direct procurement

More information

Appendix D Contractor and Reseller Information. Lot 1 Software

Appendix D Contractor and Reseller Information. Lot 1 Software Appendix D - Contractor and Page 1 of 3 Appendix D Contractor and... 1 Procurement Card and Prompt Payment Discount Information... 2... 3... 3 Contractor will complete Appendix D Contractor and for any

More information

Miami University Purchasing Card Policy & Procedure

Miami University Purchasing Card Policy & Procedure Miami University Purchasing Card Policy & Procedure MAY 22, 2015 1 Table of Contents Program Purpose... 3 Overview... 3 Advantages... 4 Getting Started- Card Application & Activation... 4 Capabilities,

More information

Cash Flow Exclusive / May 2015

Cash Flow Exclusive / May 2015 Ralf Bieler Co-Founder, President, CEO Cash Flow Exclusive, LLC My 2 Cents on Fraud & Protection for Small-Ticket Factors Fraud happens! And the banking and financial services industry is the one with

More information

GRANITE SCHOOL DISTRICT PURCHASING CARD PROGRAM POLICIES AND PROCEDURES MANUAL

GRANITE SCHOOL DISTRICT PURCHASING CARD PROGRAM POLICIES AND PROCEDURES MANUAL GRANITE SCHOOL DISTRICT PURCHASING CARD PROGRAM POLICIES AND PROCEDURES MANUAL Revised 11/11/2014 Overview The purpose of the Purchasing Card is to establish a more efficient, cost-effective method of

More information

Procure to Pay Process Four Requisition Types. Procure to Pay Process Four Payment Types

Procure to Pay Process Four Requisition Types. Procure to Pay Process Four Payment Types Four Requisition Types Requisition for low dollar amount, item is not on a catalog Requisition for a low dollar amount, item is on a catalog Requisition is for a high dollar amount, item is not on a catalog.

More information

Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes

Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes REMEDYNE Continuous Monitoring Document Version: Rel. 1.6 2015-09- 07 Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS

More information

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT

OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,

More information

PURCHASING CARD POLICY AND PROCEDURES

PURCHASING CARD POLICY AND PROCEDURES PURCHASING CARD POLICY AND PROCEDURES 1. PURPOSE To establish policies and procedures for procuring goods and/or services using a Purchasing Card. Purchasing Cards are referred to throughout this policy

More information

Cardholder s Guide Policy for Disputed POS Transactions

Cardholder s Guide Policy for Disputed POS Transactions Cardholder s Guide Policy for Disputed POS Transactions Original Publication Revisions This document is protected under the trade secret and copyright laws as the property of Metavante Corporation. Year

More information

Best Practice: Purchasing Card Auditing at Ohio University Shannon Bruce Ohio University

Best Practice: Purchasing Card Auditing at Ohio University Shannon Bruce Ohio University Best Practice: Purchasing Card Auditing at Ohio University Shannon Bruce Ohio University Sue Shaw Ohio University Cindy Meyer Ohio University EXECUTIVE SUMMARY: In 1998, Ohio University implemented a purchasing

More information

Comparison of Generalized Audit Software

Comparison of Generalized Audit Software Comparison of Generalized Audit Software In today s modern and computerized world even small companies have huge numbers of financial transactions going through the books. As an (external) auditor, it

More information

Descriptive Statistics and Measurement Scales

Descriptive Statistics and Measurement Scales Descriptive Statistics 1 Descriptive Statistics and Measurement Scales Descriptive statistics are used to describe the basic features of the data in a study. They provide simple summaries about the sample

More information

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments

GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why

More information

How To Prevent Fraud On A Credit Card

How To Prevent Fraud On A Credit Card Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies

More information

Purchasing Card General Policy and User s Manual

Purchasing Card General Policy and User s Manual Purchasing Card General Policy and User s Manual Welcome to the Valley City State University Purchasing Card Program. The purchasing card is meant to replace the current purchase order or voucher (request

More information

Basic Account Basic Account

Basic Account Basic Account Basic Account Basic Account Looking after your money, everyday Contents Basic Account 3 Using your Basic Account 5 Getting more from your Visa debit card 6 How to pay money into your account 8 Paying your

More information

Office of Business and Finance

Office of Business and Finance OBJECTIVE To establish procedures for review and payment of invoices for goods and services purchased by the university. POLICY Applies to: Faculty, staff, students, visitors, vendors Issued: 8/2000 Revised:

More information

Association of Certified Fraud Examiners. How to Cheat on Your Expense Report

Association of Certified Fraud Examiners. How to Cheat on Your Expense Report Association of Certified Fraud Examiners The Institute of Internal Auditors Dallas Chapters March 5, 2009 Fraud Training How to Cheat on Your Expense Report Presenter Stephen M. Nelder, CPA, CFE snelder@cbiz.com

More information

Dan French Founder & CEO, Consider Solutions

Dan French Founder & CEO, Consider Solutions Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The

More information

WellsOne Commercial Card Summary-Commercial Card Expense Reporting (CCER)

WellsOne Commercial Card Summary-Commercial Card Expense Reporting (CCER) WellsOne Commercial Card Summary-Commercial Card Expense Reporting (CCER) Quick Reference of Resources for Your Purchasing Card: Business Purchasing Service Center 24-hour Customer Service Number 1 (800)

More information

Case Western Reserve University Procurement Card Policy TABLE OF CONTENTS

Case Western Reserve University Procurement Card Policy TABLE OF CONTENTS Case Western Reserve University Procurement Card Policy TABLE OF CONTENTS 1. General Principles 2. Policy 3. Documentation 4. Reconciliation and Approval 5. Security 6. Dollar Limits 7. Cardholder Employment

More information

INTRODUCTION TO FRAUD EXAMINATION

INTRODUCTION TO FRAUD EXAMINATION INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed

More information

Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4

Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 Incorporating Behavioral Analytics into Exception-Based Reporting O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 Table of Contents Introduction 3 What are Behavioral Exceptions? 3 How Do Behavioral

More information

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP

Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business

More information

Purchasing Card Training. Susan Taylor (Purchasing) 801-826-5391 Cindee Clawson (Accounting) 801-826-5341

Purchasing Card Training. Susan Taylor (Purchasing) 801-826-5391 Cindee Clawson (Accounting) 801-826-5341 Purchasing Card Training Susan Taylor (Purchasing) 801-826-5391 Cindee Clawson (Accounting) 801-826-5341 Overview The Canyons School District implemented the U.S. Bank Visa Purchasing Card Program (State

More information

FINANCIAL ELECTRONIC DATA INTERCHANGE GUIDE for Vendors, Localities, Grantees, State Agencies and Non-state Agencies

FINANCIAL ELECTRONIC DATA INTERCHANGE GUIDE for Vendors, Localities, Grantees, State Agencies and Non-state Agencies FINANCIAL ELECTRONIC DATA INTERCHANGE GUIDE for Vendors, Localities, Grantees, State Agencies and Non-state Agencies COMMONWEALTH OF VIRGINIA 07/01/2009 VA Department of Accounts Financial Electronic Data

More information

Perfect Payables. Scott Pezza Research Analyst Aberdeen Group Sush Koka Senior Director, Product Marketing ADP Procure-to-Pay Solutions

Perfect Payables. Scott Pezza Research Analyst Aberdeen Group Sush Koka Senior Director, Product Marketing ADP Procure-to-Pay Solutions Perfect Payables Best Practices for Performance Improvement and Supplier Participation December 15 th, 2011 Scott Pezza Research Analyst Aberdeen Group Sush Koka Senior Director, Product Marketing ADP

More information

Procurement Credit Card Handbook

Procurement Credit Card Handbook California State University East Bay Revised December 2014 Office of Procurement Services Procurement Credit Card Handbook The CSUEB Procurement Card Handbook is in support of the CSU system ICSUAM policy

More information