Cressey s fraud triangle: All 3 conditions must be present for fraud to occur
|
|
|
- Brooke Smith
- 10 years ago
- Views:
Transcription
1 DEfINITION Of fraud AND fraud INvESTIgATION Dilek ÇİLİNgİR Ernst & Young What is fraud? According to International Standard on Auditing (240): An intentional act By one or more individuals among management, those charged with governance, employees, or third parties Involving the use of deception To obtain an unjust or illegal advantage Cressey s fraud triangle: All 3 conditions must be present for fraud to occur
2 fraud Scale: when is fraud risk increases? High Risk Low Risk Situational pressure High Low Opportunity High Low Personal integrity Low High Red flags Red flags are the risk factors or risk indicators that conditions for fraud exist 1)Risk factors: Opportunity -Ineffective monitoring of management -Assets susceptible to diversion -Financials are based on estimates that involve judgment or uncertainties difficult to corroborate -Unusual or highly complex transactions especially close to period end -Ineffective accounting, information and control systems -Absence of ethical business culture -Not paying enough attention -Deficiencies in internal control (Approval mechanism, IT controls, segregation of duties etc.) 2)Risk factors: Incentive -Personal financial obligations -Perceived or real adverse effects of reporting poor financial results -Personal financial situation is threatened by the entity s financial performance
3 -Excessive pressure to meet financial targets -Recurring negative cash flows while reporting profit -Personal benefit -Company pressure (aiming higher targets) 3)Risk factors: Rationalization Changes in behavior or lifestyle Communication of inappropriate values or ethical standards Non-financial management s excessive participation in the selection of accounting principles or the determination of significant estimates Excessive interest in maintaining or increasing the entity s stock price or earnings trend Failing to correcting known reportable conditions on a timely basis Not getting enough appreciation Need for an asset that exceeds company s need for the same asset Cues of Rationalization - Everyone else was doing it - They can afford it - I needed the money - It was just a loan I would have repaid it - I felt used and wanted revenge - I meant no harm and did no harm - I did it to keep the business afloat - Bribery is the norm in this type of business - What I did was entirely appropriate for someone in my position - My employer didn t compensate me well enough, so I took what was due to me
4 Importance of rationalization Rationalization cuts right to the heart of the psychology of the fraudster: the ability of fraudsters to convince themselves that what they are doing is acceptable enables otherwise good people to do stupid things A Guide To Forensic Accounting Investigation (Thomas W Golden) If you are above average intelligence you are at risk of perpetrating fraud because the strength of your cognitive equipment Why Smart People Do Dumb Things (Mortimer Feinberg and John J Tarrant) Some fraud Truths -Unlike their expectation most companies experience fraud -Most fraud goes undetected -Most frauds reveal some indicators that they are in progress -Most frauds start small and grow bigger -Most frauds involve a number of fraud schemes -Most people are capable of fraud fraudsters are not obvious -Most serious fraud is committed by management -Management fraud has the highest impact fraud Impact
5 Characteristics of a fraudster? How does this profile of the typical white collar criminal help you identify fraud? Older (30+ years) 55% male, 45% female Appearance of stable family Above average education Less likely to have criminal record Good psychological health Position of trust Detailed knowledge of accounting systems and weaknesses Prior accounting experience (Research by Michael L Belson and Elizabeth Moore) Can you spot a fraudster? There are two types of fraudster: Predators (less common) A professional deceiver - searches out opportunities to commit fraud Will seek to look normal as part of modus operandi Unconcerned about the harm caused Calm (most common) Find themselves in and take advantage of conditions conducive to fraud Acts normal except for abnormal circumstances Do not intend to cause harm Both look normal and so are difficult to identify
6 Working assumption All nice people are fraudsters* *Potentially Most Common Techniques in fraud Detection fraud Categories Corruption Conflict of Interest - Turnaround sale - Defective invoicing - Erasing receivables - Business Diversion - Resource Diversion
7 Bribe - Kick back - Bid-rigging Economic Extortion Illegal Gratuities Asset Misappropriation 1.Cash 2.Inventory and Other Assets Cash Misappropriation 1.Cash Theft 1.Theft of incoming cash 2.Theft form bank accounts 2.Fraudulent Disbursements 1.Register Disbursement Schemes (shell companies, innocent vendors and personal purchases) 2.Payroll Fraud (ghost employees, commission schemes, falsified salary) 3.Expense Reimbursement Schemes (mischaracterized expense reimbursements, overstated or fictitious expense reimbursements, multiple reimbursements) 4.Check Tampering 5.Expense Reimbursement Schemes from Petty Cash 3.Cash Skimming 1.Sales Skimming (unrecorded sales and understated sales) 2.Receivables Skimming (forcing account balances or destroying accounting records and lapping)
8 Asset Misappropriation: Inventory and Other Assets Misuse of inventory and other assets Theft of inventory and other assets o Asset transfers o Fraudulent bankruptcy o Falsifying incoming shipments o Undisguised larceny Distorted financial Statements Overstatement of Assets / Income Timing differences Overstated or fictitious income Understated expenses Improper asset valuations Improper disclosures Understatement of Assets / Income Other fraud Schemes (examples only) Long shore fraud Seemingly legitimate company established, collects customer monies then disappears Advanced fee fraud Fees collected on promise of services with no intention of delivery Insurance fraud Manipulating insurance claims Parallel business Running a private business using employer s time/resources Ponzi (pyramid/round robin) scheme Scheme that relies on new customers monies to repay earlier commitments but is in total not viable
9 Other Type of frauds Fraudulent Bankruptcy Tax Fraud Security Fraud Money Laundering Customer Frauds Computer and Internet Fraud Government Fraud Intellectual Property Fraud Insurance Fraud financial Institution fraud Embezzlement is the illegally transformation of others money for someone s own benefit Misuse is illegally using/directing others money for someone s own benefit Embezzlement Schemes False accounting entries Unauthorized withdrawal of money Unauthorized disbursement of funds to outsiders Paying personal expenses from bank funds Theft of physical property Moving money from customers dormant or inactive accounts Unauthorized, unrecorded cash payments Theft and other unauthorized use of collateral general Loan frauds Loans to nonexistent borrowers Sham loans with kickbacks and diversion
10 Double-pledging collateral Reciprocal loan arrangements Daisy chain Linked financing (large deposits are offered to a bank on the condition that loans are made to particular persons affiliated with deposit broker, generally the loans are longer term than the deposits) Construction Loans Most common 3 schemes are: Estimates of costs to complete (overstatement of costs), Developer overhead (used to bring forward the payment time) Non practice of contract in order to decrease costs Other than above we can call real estate, appraisal, ATM and letter of credit schemes. Money Laundering: What is it and how is it done? Money laundering: moving funds of illicit origin ( dirty money ); the ultimate objective is to disguise the illicit origin (create apparently clean money ) It is a much broader concept than fraud as it concerns monies from all illicit activities and not just fraud Whilst financial institutions are most at risk (as funds transfer is a core business) all businesses are at risk of involvement Basic Anti-Money Laundering ( AML ) Measures Limits and law enforcement reporting requirements on cash transactions More rigorous for susceptible cash businesses e.g, Casinos High value retailers Requirement to validate new customers bona fides ( Know Your Customer (KYC) )
11 Requirement for transaction monitoring (data analytics) of activities against expected behavioral norms based on KYC and historical transaction patterns Anti-fraud Program An effective anti-fraud program should include each of the following elements: The purpose of the code of ethics is to promote: Honest and ethical conduct Full, fair, accurate, timely, and understandable disclosure in reports and documents Prompt internal reporting of violations of the code formal fraud prevention policies should: Guide employees through complex issues Be specific to the individual organization and its operations Provide a channel for employees or third-parties to report fraud Communication andztraining should focus on: Educating employees on the organization s code of ethics Understanding protocols for reporting suspicious activity The purpose of the fraud risk assessment is to identify: Common types of fraud schemes that could occur within any organization Specific fraud schemes that are industry/sector-specific Fraud schemes that may be more prevalent in specific geographic locations
12 fraud Controls monitoring should: Develop action plans to improve fraud controls for priority fraud risks Assess, improve and monitor controls against general fraud risks Report the results of the action plans to executive management and/or the audit committee Effective fraud Response Plan: Investigation protocols Improve current fraud response plan Prepare systematic and disciplinary procedures Investigation Developing an Investigation Plan, Performance, Interview, Reporting, Following Up After Investigation Developing an investigation plan Understanding the operational flow Initial inquiries with operational units, High level documentation of processes, Identifying resources Auditing, Human Resources, Timeframe Developing the audit plan, Resource, inspection scope and methodology
13 Performance, Commitment to the engagement plan, Sharing unexpected findings, By setting periodic and instantaneous meetings with sponsor, findings that may cause difficulty for the client are to be shared Reassessment of Investigation Scope, In the light of new findings assessing the interim period scope level and allocation of resources and deadlines for the issues that will be added to the inspection scope Reassessing projected timeframe Commitment to Auditing Principles and Feedback, All auditors should get frequent feedbacks from the engagement leader regarding the principles set at the beginning of the engagement, Secrecy Result oriented work Material findings Efficiency of documentation are some of the principles that auditors should not deviate from Generally Accepted Auditing Standards. Finding: Physical facts that have not gained legal property yet Evidence: Evidence is the total of physical findings and documents needed to substantiate a thesis Evidence is any finding and proof that is legally unprohibited to substitute and that causes to solve a legal issue, to prove a crime act and determine the crime suspects Every evidence is a finding but every finding is not an evidence For instance, presence of gunpowder gas in a crime place is a finding but it is not an evidence until it is measured with a gas emission equipment and the measurement is properly registered and documented Non-evidence findings, Recordings without permission cannot be used as evidence (Turkish Criminal Code)
14 For example: Phone recordings, Recordings with secret cameras Personal notes and writings, Electronic mails gathered from the person s work computer unless it is permitted in the job contract, Copies of documents, Oral statements Important Issues, It is essential to protect the evidence due to loss and fraudulent alteration risks Copies should be made as soon as the original evidence is acquired Signatures on the documents that are considered as evidence should be subject to eye examinati on with comparison to the book of authorized signatures. In case of any objection, related documents and signature specimen should be sent to Forensic Science Lab for further analysis Interview, To understand the documentation process, timing and causality, it is needed to have an inter view with an employee that is knowledgeable about the related transaction Interviews are the planned meetings preferable made face to face Most crucial aspect of a good interview is to gather the relevant information from the interviewed person within the shortest timeframe Important properties of a good interview -Effective planning -Effective interview -Listening techniques -Effective communication management Interviews can be classified as the ones made with the witnesses and the ones made with the suspects. The aim is to gather information in the former while the real aim is to get the confession in the latter.
15 Differences between the two types of interviews mentioned above. Suspects tendency is generally to hide information and not to confess. Hence, they are likely to give false statements to the inquirer and due to this reason to get successful results a more effective inquiry technique is needed. Inquirers need to direct the suspect to make valid statements regarding the crime. Types of Questions Comprehensive open ended questions Would you tell us what were mentioned during the meetings? Focused open ended questions What did Mr. Ahmet mention during the meeting? Open ended investigation questions Who decided to pay to Mr. Mehmet during the meeting? Close ended investigation questions Hence it is Mr. Ahmet who offered to pay to Mr. Mehmet isn t it? Approval questions As far as I understand you heard Mr. Ahmet saying Give Mr. Mehmet some money, did I get that correct? Completeness affirmation Is there anything else about this subject that you would like to add before we continue with another subject? Reporting, Issues Regarding Effective Reporting: Material Findings, Finding the Effective Expression Method, Chronological Expression, Thematic Expression, Findings and Suggestions,
16 Efficient usage of visuals, Confirmation of the presence of all findings in working papers to be forwarded to the end reports Material findings, All issues in the reports should be supported by material documents Evidence should be noted if they could not be confirmed with regards to the oral statements Report should be free of any personal experience and subjectivity Each and every number in the report should match with supporting documents and other numbers in the report. If there is any deviance this issue should be stated in the report finding the Effective Expression Method, Chronological Expression Should be used for one-dimensional investigations (i.e. unfair promotion of someone, presence of a fraudulent transaction and disputation of the results, etc.) Should be used when the chronological order of transactions is important for the investigation (i.e. emergence of a tax related punishment) Thematic Expression To express complicated and multi issued cases, subject should be separated into simple parts (i.e. Cash theft and embezzlement of client properties by an employee, inadequate control of firm processes, etc.) Deficiencies about different issues should be consolidated in the report under the part Management Summary. In this summary only the subjects that are expressed in detail in the report should take place. findings and Suggestions This type of expression should be used when end findings and suggestions point the results.(i.e. Due to lack of control, acceptance of a high amount invoice by the accounting department) Can be used with both chorological and thematic expression (Chronological Progress + Findings and Suggestions) Findings and suggestions should be corresponding and cognizable to the reported parties.
17 Efficient Usage of visuals, Report Visuals (Tables, graphs, charts, flow charts etc.) Should support the end result, Should express the opinion at a glance to the reported party, Should be consistent, Should not deviate from the core aim of the report. Assuring the transfer of all findings in working papers to the end report All working papers would be related to engagement plan. All working papers should be examined to make sure that all findings are transferred to the report in a correct and precise manner Issues that are open to comment in the working papers whould be noted in the report (i.e. To the letter we sent for account reconciliation, 2 banks haven t replied as of report date) following up the investigation, Following up the elimination of flaws Elimination of findings that are mentioned in Findings/Suggestions report should be documented by the client in writing. An affirmative visit should be scheduled after a reasonable time For the flaws due to lack of information related personnel should be encouraged to participate in related education When material damage is found, Should proceed to legal counselor in the light of material findings and evidence A copy of the report should be directed to the court with a summarized cover letter prepared by the legal counselor When needed the summary of the report should be expressed as a witness during the court by the auditor
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
Fraud and internal controls, Part 3: Internal fraud schemes
Fraud and internal controls, Part 3: Internal fraud schemes By EVERETT COLBY, CFE, FCGA This is the third and final article in a series by Mr. Colby on Fraud and internal controls to be carried on PD Net.
INTRODUCTION TO FRAUD EXAMINATION
INTRODUCTION TO FRAUD EXAMINATION GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON 240 THE AUDITOR S RESPONSIBILITIES RELATING TO (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA
Introduction to Fraud Examination World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA VII. FRAUDULENT FINANCIAL TRANSACTIONS: FRAUD SCHEMES Introduction Fraud can be committed
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
GLOBAL PORTS INVESTMENTS PLC
Adopted by the Directors of GLOBAL PORTS INVESTMENTS PLC Resolution of 14 July 2008 GLOBAL PORTS INVESTMENTS PLC (previously GLOBAL PORTS INVESTMENTS LTD) ANTI-FRAUD POLICY TABLE OF CONTENTS 1. INTRODUCTION.....
How To Handle A Fraud At Psc
FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Centre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
The auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
Financial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes
Fraud: Real Stories, Real People, Real Impact
Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle
716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Fraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 1719 AU Section 316 Consideration of Fraud in a Financial Statement Audit (Supersedes SAS No. 82.) Source: SAS No. 99; SAS No. 113. Effective for audits
Fraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement
Understanding the Entity and Its Environment 1667 AU Section 314 Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement (Supersedes SAS No. 55.) Source: SAS No. 109.
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
How To Find Out If A Company Misstatement Is True
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 11 AUDITING INVENTORY, GOODS AND SERVICES, AND ACCOUNTS
NCI BUILDING SYSTEMS, INC. FOREIGN CORRUPT PRACTICES ACT POLICY STATEMENT AND COMPLIANCE GUIDE
NCI BUILDING SYSTEMS, INC. FOREIGN CORRUPT PRACTICES ACT POLICY STATEMENT AND COMPLIANCE GUIDE Introduction The Foreign Corrupt Practices Act as amended by the International Anti-bribery and Fair Competition
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
BRIBERY AND CORRUPTION
FRAUD SCHEMES Fraud An intentional act by one or more individuals among management, those charged with governance, employees, or third parties, involving the use of deception to obtain an unjust or illegal
Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud
Sobel & Co. s Nonprofit and Social Services Group presents Your Organization is Vulnerable: The Facts About Nonprofits and Fraud Why Smart People Do Dumb Things If you are above average intelligence -
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
Platform Specialty Products Corporation Foreign Corrupt Practices Act/Anti-Corruption Policy
1. Introduction. Platform Specialty Products Corporation Foreign Corrupt Practices Act/Anti-Corruption Policy 1.1 Combating Corruption. Platform Specialty Products Corporation, including its subsidiaries,
Discovering the Secrets of Detecting Fraud in Accounts Receivable
Discovering the Secrets of Detecting Fraud in Accounts Receivable Speaker Joseph R. Dervaes, CFE, CIA 1995 ACFE Distinguished Achievement Award 2003 ACFE Donald R. Cressey Award 2007 ACFE Outstanding Achievement
TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)
PAGE 1 of 5 TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending) ORIGINAL: 11/03 REVISED: 10/07, 09/10, 04/13 REVIEWED: EFFECTIVE DATE Acute Care
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2010 Global Fraud Study Letter from the President When the ACFE published its first Report to the Nation on Occupational Fraud and Abuse in 1996, it
Asterias Biotherapeutics, Inc. Code Of Business Conduct And Ethics. March 10, 2013
Asterias Biotherapeutics, Inc. Code Of Business Conduct And Ethics March 10, 2013 This Code of Business Conduct and Ethics (the "Code") sets forth legal and ethical standards of conduct for directors,
Audit Quality Thematic Review
Thematic Review Professional discipline Financial Reporting Council January 2014 Audit Quality Thematic Review Fraud risks and laws and regulations The FRC is responsible for promoting high quality corporate
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
A Guide to Forensic Accounting Investigation. 2nd Edition
Brochure More information from http://www.researchandmarkets.com/reports/2211320/ A Guide to Forensic Accounting Investigation. 2nd Edition Description: Recent catastrophic business failures have caused
5 Important Controls to Mitigate Employee Fraud
5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY Letter from the President & CEO More than 15 years ago, the ACFE s founder and Chairman, Dr. Joseph T. Wells, CFE, CPA, conceptualized
Worldwide Anti-Corruption Policy
Worldwide Anti-Corruption Policy I. PURPOSE The laws of most countries make the payment or offer of payment or even receipt of a bribe, kickback or other corrupt payment a crime, subjecting both Eaton
Leonard W. Vona, CPA, CFE
Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: [email protected] Part of an auditor s job is
Ethics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
Modalities for Forensic Review of Computer Related Frauds
Modalities for Forensic Review of Computer Related Frauds Neneh Addico (CFE, CA), MTN Ghana Outline Recent Computer Crime Cases What is Computer Crime Forensics Types of Computer Related Crimes Relevance
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS
PHILIPPINE LONG DISTANCE TELEPHONE COMPANY CODE OF BUSINESS CONDUCT AND ETHICS Philippine Long Distance Telephone Company ( PLDT or the Company ) is dedicated to doing business in accordance with the highest
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
The way we do business.
a b The way we do business. Our Code of Conduct and Ethics. Our Code of Conduct and Ethics In this Code, the Board of Directors and the Group Executive Board set out the principles and practices that define
FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives
FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial
Investigative Techniques
Investigative Techniques Data Analysis and Reporting Tools 2016 Association of Certified Fraud Examiners, Inc. Data Mining v. Data Analysis Data mining is the science of searching large volumes of data
How To Prevent Fraud On A Credit Card
Fraud Detection and Prevention Financial Management Advisory Council August 28, 2014 Sarah Mahugh, CPA, MBA Financial Audit Audit Manager Overview Fraud trends Fraud Risks and internal controls Case Studies
SM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY
SM ENERGY COMPANY CODE OF BUSINESS CONDUCT AND CONFLICT OF INTEREST POLICY We at SM Energy Company are committed to compliance with applicable laws, rules and regulations and to conducting our business
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)
HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement
CIVEO CORPORATION CORPORATE CODE OF BUSINESS CONDUCT AND ETHICS. Effective as of May 5, 2014
CIVEO CORPORATION CORPORATE CODE OF BUSINESS CONDUCT AND ETHICS Effective as of May 5, 2014 Purpose This Corporate Code of Business Conduct and Ethics (this Code ) contains the policies that relate to
Electronic Banking. Federal Trade Commission ftc.gov
Electronic Banking Federal Trade Commission ftc.gov For many people, electronic banking means 24-hour access to cash through an automated teller machine (ATM) or Direct Deposit of paychecks into checking
Financial Services Regulatory Commission Antigua and Barbuda Division of Gaming Customer Due Diligence Guidelines for
Division of Gaming Customer Due Diligence Guidelines for Interactive Gaming & Interactive Wagering Companies November 2005 Customer Due Diligence for Interactive Gaming & Interactive Wagering Companies
CODE OF BUSINESS CONDUCT AND ETHICS
CODE OF BUSINESS CONDUCT AND ETHICS Introduction This (the Code ) applies to Oceaneering International, Inc. and its subsidiaries and other affiliated companies (together referred to as our Company, us
Destiny Media Technology s Code of Conduct
Destiny Media Technology s Code of Conduct INTRODUCTION Destiny Media Technology s ( Destiny ) reputation depends on the conduct of its employees, officers and directors who have an obligation to Destiny
Mortgage Loan Fraud Connections with Other Financial Crime:
Mortgage Loan Fraud Connections with Other Financial Crime: An Evaluation of Suspicious Activity Reports Filed By Money Services Businesses, Securities and Futures Firms, Insurance Companies and Casinos
Standards of. Conduct. Important Phone Number for Reporting Violations
Standards of Conduct It is the policy of Security Health Plan that all its business be conducted honestly, ethically, and with integrity. Security Health Plan s relationships with members, hospitals, clinics,
CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity
FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 151 AU-C Section 240 Consideration of Fraud in a Financial Statement Audit Source: SAS No. 122; SAS No. 128. Effective for audits of financial statements
7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?
From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
BANK SECRECY ACT REQUIREMENTS FOR RESIDENTIAL MORTGAGE LOAN ORIGINATIORS: AN OVERVIEW
BANK SECRECY ACT REQUIREMENTS FOR RESIDENTIAL MORTGAGE LOAN ORIGINATIORS: AN OVERVIEW June 6, 2012 Marjorie A. Corwin, Esquire Gordon Feinblatt LLC 233 East Redwood Street Baltimore, Maryland 21202 410-576-4041
Chapter 15: Accounts Payable and Purchases
Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:
IPPF Practice Guide. Internal Auditing and Fraud
IPPF Practice Guide Internal Auditing and Fraud December 2009 IPPF Practice Guide Table of Contents Introduction... 1 Executive Summary... 2 Definition of Fraud... 4 Fraud Awareness... 5 A. Reasons for
Auditing Standard ASA 240 The Auditor's Responsibilities Relating to Fraud in an Audit of a Financial Report
Compiled Auditing Standard ASA 240 (November 2013) Auditing Standard ASA 240 The Auditor's Responsibilities Relating to Fraud in an Audit of a Financial Report This compilation was prepared on 11 November
UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS. Revised as of March 3, 2014
I. Statement of Policy UNIVERSAL INSURANCE HOLDINGS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Revised as of March 3, 2014 Universal Insurance Holdings, Inc. ( UIH ) and its subsidiaries (collectively,
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics
Helix Energy Solutions Group, Inc. Code of Business Conduct and Ethics Introduction This Code of Business Conduct and Ethics ( Code ) covers a wide range of business practices and procedures. It does not
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Standard 9: The student will identify and explain consumer fraud and identity theft.
TEACHER GUIDE 9.1 FRAUD AND IDENTITY THEFT PAGE 1 Standard 9: The student will identify and explain consumer fraud and identity theft. Beware! Consumer Fraud Priority Academic Student Skills Personal Financial
AUDIT PROCEDURES RECEIVABLE AND SALES
184 AUDIT PROCEDURES RECEIVABLE AND SALES Ștefan Zuca Abstract The overall objective of the audit of accounts receivable and sales is to determine if they are fairly presented in the context of the financial
Supplier Anti-Corruption and Anti- Bribery Policy
Supplier Anti-Corruption and Anti- Bribery Policy 2014 Dwellworks Contents Purpose and Scope... 3 Core Principles... 4 Guidelines for Anti-Corruption and Anti-Bribery Compliance... 5 Applicable Definitions...
Fraud Examination FOURTH EDITION W. STEVE ALBRE HT CHAD. ALBRE'CHI COSNSA \1 C. ALBRECHT- MARK F. ZIMBELEVSAW. SOUTH-WESTERN CENGAGE Learning-
Fraud Examination FOURTH EDITION W. STEVE ALBRE HT Brigham Young University CHAD. ALBRE'CHI Utah State University COSNSA \1 C. ALBRECHT- Brigham Young University MARK F. ZIMBELEVSAW Brigham Young University
Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
Preventing Fraud and Abuse of Public Funds: Local Governments Need to Do Better
Office of the State Comptroller Thomas P. DiNapoli State Comptroller Division of Local Government and School Accountability August 2010 Preventing Fraud and Abuse of Public Funds: Local Governments Need
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies
What Insurance Agents and Brokers Should Expect under the New Anti-Money Laundering Regulations for Life Insurance Companies The USA PATRIOT Act includes provisions intended to prevent the financial services
Financial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Cash Receipts 2016 Association of Certified Fraud Examiners, Inc. Fraud Tree 2016 Association of Certified Fraud Examiners, Inc. 2 of 27
1. Compliance with Laws, Rules and Regulations
CODE OF BUSINESS CONDUCT - EXAMPLE INTRODUCTION This Code of Business Conduct covers a wide range of business practices and procedures. It does not cover every issue that may arise, but it sets out basic
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
Johnson Electric Group Code of Ethics and Business Conduct
Johnson Electric Group Code of Ethics and Business Conduct Chairman s Message Johnson Electric strives to conduct its business with honesty and integrity, both within the Group and in dealing with business
Fraud, Waste & Abuse Policy
Fraud, Waste & Abuse Policy Issue Date: Policy approved by the Board of Directors on February, 18, 2015 The Independence Center (The IC) is committed to the responsible stewardship of our resources, and
