Invoice Number Vendor Number Amount A $1, A $1,035.71

Size: px
Start display at page:

Download "Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71"

Transcription

1 Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns can be symptoms of possible fraud. A simple example of the application of this technique is the search for duplicate transactions, such as the same invoice number - vendor number: Duplicate Transactions Invoice Number Vendor Number Amount A $1, A $1, Ordinarily, one would expect that invoice number - vendor number combinations, would be unique. Therefore, the existence of transactions with the same invoice number - vendor number combinations would be an unexpected pattern in the data. The identification of possible duplicate transactions would be a possible symptom of fraud that should be examined. However, fraud symptoms are only that symptoms - and care should be taken to properly investigate the transactions before jumping to conclusions. Transactions that look like duplicates may simply be progress payments or equal billing of monthly charges. It is possible to search for duplicates on one or more key fields. Even Amounts Another digital analysis technique is to identify even dollar amounts, numbers that have been rounded up, such as $ or $5, The existence of even amounts may be a symptom of possible fraud and should be examined. The MOD() function in ACL can easily identify these types of even numbers. For example: MOD(Amount,100) = 0 will identify transactions that are a multiple of 100, such as $ and $700.00, and also $1,200 and $25,000, but would not identify transactions with Amounts of $200.23, or $ MOD(Amount,1000)=0 will identify transactions with Amounts that are multiples of 1,000, such as $27,000, but would not identify transactions with Amounts of $ or $22, Case Study: Even Amounts Travel expenses had always be a concern for the auditors as controls were a weak. Employees had a maximum per diem rate when traveling, but had to submit actual receipts to cover the expenses. Maximums were also established for meals: Breakfast $10.00, Lunch $20.00 and Dinner $30.00 and for Hotel $ The auditors used the MOD() function to identify transactions that were multiples of $10.00 or multiples of $ These transactions were compared to the manual receipts to ensure that the amounts expensed were appropriate.

2 The manual review determined that some people were charging the maximum rates for meals and hotels even though the receipts did not justify the amounts. Ratio Analysis Another useful fraud detection technique is the calculation of ratios for key numeric fields. Like financial ratios that give indications of the relative health of a company, data analysis ratios point to possible symptoms of fraud. Three commonly employed ratios are: the ratio of the highest value to the lowest value (Maximum/Minimum); the ratio of the highest value to the next highest (Maximum/2 nd Highest); and the ratio of the current year to the previous year. For example, auditors concerned about prices paid for a product, could calculate the ratio of the Maximum Unit Price to the Minimum Unit Price for each product (NATO Stock Number). If the ratio is close to 1, then they can be sure that there is not much variance between the highest and lowest prices paid. However, if the ratio is large, this could be an indication that too much was paid for the product in question. Product Line Max Min Ratio Product Product Product 1 has a large difference in the unit price between the minimum and maximum (ratio of 1.85); whereas Product 2 has a smaller variance in the unit prices (ratio of 1.01). Audit should review the transactions for the unit prices of $235 and $127 for Product 1 to ensure the proper payments were made. Paying abnormally high unit prices for products may be a symptom of kickbacks in the contracting area. The ratio of the maximum to the 2 nd highest value can also highlight possible frauds. For example, examining the pattern of payments made to vendors can be revealing. In this case, a large ratio could indicate an anomaly in the data. Customer Max 2 nd Highest Ratio XYZ Corp. $100,080 $ 26, ABC Corp. $103,429 $101, A large ratio indicates that the Maximum value is significantly larger than the second highest value. Auditors and fraud investigators would be interested in these unusual transactions as they represent a deviation from the norm. Unexplained deviations could

3 be symptoms of fraud. In a number of cases, high ratios have identified payments incorrectly made to the vendor. Case Study - Doctored Bills The auditors reviewed the patient billing system to determine if the appropriate charges were being assessed the patient s healthcare providers. An initial analysis of the data was performed to calculate the ratio of the highest and lowest charges for each procedure. The auditing standards required that procedures with a ratio of Highest/Lowest greater than 1.30 be noted and additional review performed. This quarter, three procedures had ratios higher than 1.30, the highest ratio being A filter was set to identify the records related to the three procedures in question and additional analysis was performed. This quickly determined that one doctor was charging significantly more than the other doctors, for the same procedures. A comparison of the charges from the billing system with the payments recorded in the Accounts Receivable system, revealed that the doctor was skimming some of the payment received. The amount recorded in the receivable system was in line with the usual billing amount for the procedures. The doctor was unable to justify the higher prices, or explain the difference in the billing and the receivable systems. Trend Analysis Analysis of trends across years, or across departments, divisions, etc. can be very useful in detecting possible frauds. Another useful calculation is the ratio of the current year to the previous year. A high ratio indicates a significant change in the totals. Case Study - Contracting Kickbacks Johnathan, one of the contracting officers, had devised a great scheme in which he won and so did the companies who were willing to do business under his conditions. Companies who were not willing to provide him with a little extra - would not get the contract. The auditors decided to use digital analysis as part of their review of the contracting section. One of the analyses calculated the total contract amount by vendor for each of the past two years. A ratio of current year to previous year was calculated and the statistics command was used to look at the minimum, maximum, average and highest and lowest 5 ratios. While the average was close to 1.0 the highest and lowest 5 values showed that some companies had significant decreases in business, while others had experienced significant increases in business. The auditors review the detailed for all companies that had a ratio of less than 0.7 or more than The detailed records were extracted to a file and totals were calculated by contracting officer. For companies that had seen an increase in business, the results

4 revealed that Johnathan had raised many of the contracts. In comparison, Johnathan had raised no contracts with the companies that had seen a decrease in business. The auditors learned of Johnathan s kickback scheme when they interviewed salesmen from the companies that had ratios less than 0.7. Interviews with salesmen from the firms that had increased sales by 1.30 or more added credence to the fraud accusations. Benford s Law More advanced techniques take data analysis to another level, examining the actual frequency of the digits in the data. Benford s Law, developed by Frank Benford in the 1920 s, makes predictions on the occurrence of digits in the data. Benford s Law concludes that the first digit in a large number of transactions (10,000 plus) will be a 1 more often than a 2 ; and a 2 more often than a 3. In fact, the likelihood of the first digit taking on a value decreases as the value of the digit increases. Benford calculates that the first digit will be a 1 about 30%, whereas 9 only has an expected frequency of about 5% as the first digit (Ted Hill, American Scientist, July-August 1998, pp ). Benford s Law calculates the expected frequencies (rounded to three decimal places) for first and second digits as follows: Digit Frequency Frequency (First Digit) (Second Digit) However, not all data will have distributions as predicted by Benford s Law. Sometimes there is valid rationale for certain numbers occurring more frequently than expected. For example, if a company sends a large of amount of correspondence via courier, and the cost is a standard rate ($6.12) for sending a package of under one pound, then the first digit 6 or the first two digits 61 may occur more often than predicted by Benford s Law. Guidelines for deciding whether the data will comply with the Law include: there should be no set maximum or minimum; there should be no price break points ($6.12 for all packages under 1 pound, $7.13 for package more than 1 pound and less than 2 pounds); and

5 numbers should not be assigned, such as policy numbers, social insurance numbers, etc. Given Benford s Law, we would expect that valid, unaltered data to follow the predicted frequencies. Data that meets the above criteria, but fails to follow the expected frequencies, may include fraudulent amounts (Mark J. Nigrini, PhD., Digital Analysis: a computer-assisted data analysis technology for internal auditors, 1998). An analysis of the frequency distribution of the first digits or second digits can detect abnormal patterns in the data and may identify possible frauds. An even more focused test can be used to examine the frequency distribution of the first two digits (FTD). The formula for the expected frequencies is: Expected FTD Frequency = log(1+1/ftd) Therefore, the expected frequency of 13 is log(1+1/13). The expected frequencies range from for 10, to for 99 (Mark J. Nigrini, PhD., Digital Analysis: a computer-assisted data analysis technology for internal auditors, 1998). Case Study: Signing Authority The auditors were investigating possible fraud in the contracting section where thousands of contracts were raised every month. They used Benford s Law to examine the first two

6 digits of the Contract Amount. The results of their analysis revealed that the digits 49 were in the data more often than expected. Classify on the contracting office for all contracts with 49 as the first two digits determined that the contracting manager was raising contracts for amounts in the range $49,000 to $49,999 to avoid contracting regulations. Contracts under $50,000 could be sole-sourced; contracts $50,000 or higher had to be submitted to the bidding process. He was raising contracts just under the financial limit and directing them to a company owned by his wife. Conclusions Digital Analysis, an advanced application of data analysis, is a new tool for auditors and fraud investigators interested in preventing and detecting fraud. In fact, digital analysis is a case where millions of transactions make the identification of fraud symptoms easier to find then when there are only a few thousand transactions. The patterns in the data become more obvious and focus attention on the fraud. Dave Coderre Author of The Fraud Toolkit; Fraud Detection: Using Data Analysis Techniques to Detect Fraud and CAATTs and Other BEASTs for Auditors Dave_Coderre@hotmail.com

Fraud Detection & Data Analytics

Fraud Detection & Data Analytics September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics

More information

Contents. xiii xv. Case Studies Preface

Contents. xiii xv. Case Studies Preface Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants

More information

Fraud Workshop Finding the truth in the transactions

Fraud Workshop Finding the truth in the transactions Your Trusted Partner for Audit Analytics Fraud Workshop Finding the truth in the transactions Copyright 2011 ACL Services Ltd. Robin Clough, ACDA ACL Certified Trainer Copyright 2011 ACL Services Ltd.

More information

Benford s Law and Digital Frequency Analysis

Benford s Law and Digital Frequency Analysis Get M.A.D. with the Numbers! Moving Benford s Law from Art to Science BY DAVID G. BANKS, CFE, CIA September/October 2000 Until recently, using Benford s Law was as much of an art as a science. Fraud examiners

More information

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST

ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,

More information

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S.

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP eferrara@forrester.com. Copyright 2015 Edward S. MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@forrester.com Fraud Awareness & Internal Controls Awareness Internal

More information

An Auditor s Guide to Data Analytics

An Auditor s Guide to Data Analytics An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade

More information

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)

More information

Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford s Law Distributions

Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford s Law Distributions Detecting Fraud in Health Insurance Data: Learning to Model Incomplete Benford s Law Distributions Fletcher Lu 1 and J. Efrim Boritz 2 1 School of Computer Science, University of Waterloo & Canadian Institute

More information

Internal Controls, Fraud Detection and ERP

Internal Controls, Fraud Detection and ERP Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility

More information

Forensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University

Forensic Analytics and Employee Fraud. Presented by. Mark J. Nigrini Ph.D. Professor, West Virginia University The Charleston Chapter of the ACFE 2015 Training Day Date: May 8, 2015 Time: 8:00 4:30 Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini Ph.D Professor, West Virginia University Location:

More information

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls

Internal Auditing & Controls. Examination phase of the internal audit Module 5. Course Name: Internal Auditing & Controls Course Name: Internal Auditing & Controls Module: 5 Module Title: Examination phase of the internal audit Lecture and handouts prepared by Chuck Campbell Examination phase of the internal audit Module

More information

Benford s Law: Can It Be Used to Detect Irregularities in First Party Automobile Insurance Claims?

Benford s Law: Can It Be Used to Detect Irregularities in First Party Automobile Insurance Claims? Benford s Law: Can It Be Used to Detect Irregularities in First Party Automobile Insurance Claims? Scott Daniel Petucci Utica Mutual Insurance Group Abstract The research described in this article demonstrates

More information

Fighting Fraud with Data Mining & Analysis

Fighting Fraud with Data Mining & Analysis Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: leonard@leonardvona.com Copyright 2008 Leonard Vona and Fraud

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,

More information

Advanced Data Analytics, the Fraudsters Worst Enemy

Advanced Data Analytics, the Fraudsters Worst Enemy Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability

More information

Chapter 15 Auditing the Expenditure Cycle

Chapter 15 Auditing the Expenditure Cycle Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases

More information

Forensic Analytics and Employee Fraud

Forensic Analytics and Employee Fraud Chapter Meeting Announcement Forensic Analytics and Employee Fraud Presented by Mark J. Nigrini, Ph.D. DATE: Friday, April 24, 2015 PLACE: Education Service Center Region 19 6611 Boeing Drive El Paso,

More information

Data analysis for Internal Audit

Data analysis for Internal Audit Data analysis for Internal Audit What is Data Analytics Analytics is the process of obtaining an optimal or realistic decision based on existing data. Wikipedia Data analytics is the science of examining

More information

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.

More information

ACL Command Reference

ACL Command Reference ACL Command Reference Test or Operation Explanation Command(s) Key fields*/records Output Basic Completeness Uniqueness Frequency & Materiality Distribution Multi-File Combinations, Comparisons, and Associations

More information

OUT-OF DISTRICT EMPLOYEE TRAVEL DEE

OUT-OF DISTRICT EMPLOYEE TRAVEL DEE Employees shall be reimbursed for reasonable travel expenditures according to the policies and procedures outlined in this document. Prior approval for all out-of-district travel shall be obtained before

More information

716 West Ave Austin, TX 78701-2727 USA

716 West Ave Austin, TX 78701-2727 USA How to Detect and Prevent Financial Statement Fraud GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA VI. GENERAL TECHNIQUES FOR FINANCIAL STATEMENT ANALYSIS Financial Statement

More information

City of Berkeley. Accounts Payable Audit

City of Berkeley. Accounts Payable Audit City of Berkeley Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior Auditor, CIA, CGAP Presented to Council

More information

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

AGA Kansas City Chapter Data Analytics & Continuous Monitoring AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help

More information

Fraud Awareness Training

Fraud Awareness Training UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for

More information

COST AND MANAGEMENT ACCOUNTING

COST AND MANAGEMENT ACCOUNTING EXECUTIVE PROGRAMME COST AND MANAGEMENT ACCOUNTING SAMPLE TEST PAPER (This test paper is for practice and self study only and not to be sent to the institute) Time allowed: 3 hours Maximum marks : 100

More information

A Performance Audit of the State s Purchasing Card Program

A Performance Audit of the State s Purchasing Card Program REPORT TO THE UTAH LEGISLATURE Number 2006-09 A Performance Audit of the State s Purchasing Card Program September 2006 Audit Performed By: Audit Manager Audit Supervisor Audit Staff Rick Coleman Susan

More information

Using Technology to Automate Fraud Detection Within Key Business Process Areas

Using Technology to Automate Fraud Detection Within Key Business Process Areas Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd

More information

Procurement Fraud Identification & Role of Data Mining

Procurement Fraud Identification & Role of Data Mining The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application

More information

Internal Audit Practice Guide

Internal Audit Practice Guide Internal Audit Practice Guide Continuous Auditing Office of the Comptroller General, Internal Audit Sector May 2010 Table of Contents Purpose...1 Background...1 Definitions...2 Continuous Auditing Professional

More information

Third Party Vendors: Are Your Controls Effective?

Third Party Vendors: Are Your Controls Effective? Third Party Vendors: Are Your Controls Effective? Presented by: Michael Paris, Executive Director Business Intelligence, Vendormate a GHX Company Debi Weatherford, Executive Director Internal Audit, Piedmont

More information

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401)

HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) HOW TO DETECT AND PREVENT FINANCIAL STATEMENT FRAUD (SECOND EDITION) (NO. 99-5401) VI. INVESTIGATION TECHNIQUES FOR FRAUDULENT FINANCIAL STATEMENT ALLEGATIONS Financial Statement Analysis Financial statement

More information

Chapter 15: Accounts Payable and Purchases

Chapter 15: Accounts Payable and Purchases Accounting Research Manager - Audit Private Accounting Research Manager Miller Interpretations and Other Resources Knowledge-Based Audit Procedures Chapter 15: Accounts Payable and Purchases Chapter 15:

More information

Citywide Contract Compliance Audit Report

Citywide Contract Compliance Audit Report City of Berkeley Office of the City Auditor Ann-Marie Hogan, City Auditor Citywide Contract Compliance Audit Report Prepared by: Ann Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit

More information

Accounts Payable Fraud Services

Accounts Payable Fraud Services Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In

More information

A Guide to Benford s Law. A CaseWare IDEA Research Department Document

A Guide to Benford s Law. A CaseWare IDEA Research Department Document A Guide to Benford s Law A CaseWare IDEA Research Department Document January 30, 2007 CaseWare IDEA Inc. is a privately-held software development and marketing company, with offices in Toronto and Ottawa,

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A

Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no

More information

THE AUDITOR S RESPONSES TO ASSESSED RISKS

THE AUDITOR S RESPONSES TO ASSESSED RISKS SINGAPORE STANDARD ON AUDITING SSA 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS This revised Singapore Standard on Auditing (SSA) 330 supersedes SSA 330 The Auditor s Procedures in Response to Assessed

More information

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud

T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 rich@richlanza.com

More information

Why is Internal Audit so Hard?

Why is Internal Audit so Hard? Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets

More information

Liberty County School District Purchasing Card Procedures

Liberty County School District Purchasing Card Procedures PURCHASING CARD POLICY All purchases made using the Purchasing Card must be for official school business and in accordance with the District procurement code. The card must not be used for personal expenditures

More information

Use of Data Extraction & Analysis Software In a Financial Statement Audit

Use of Data Extraction & Analysis Software In a Financial Statement Audit Use of Data Extraction & Analysis Software In a Financial Statement Audit A Message from The Audit Wizard April 2008 Making Auditors Proficient, Inc. Phone: 352-750-9636 www.billallen.com E-mail: ballen@billallen.com

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for

More information

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 520 ANALYTICAL PROCEDURES CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 520 ANALYTICAL PROCEDURES CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 520 ANALYTICAL PROCEDURES CONTENTS Paragraph Introduction... 1-3-4 Nature and Purpose of Analytical Procedures... 4-7 Analytical Procedures as Risk Assessment

More information

THE UNIVERSITY OF AKRON VISA PROCUREMENT CARD PROGRAM USER S MANUAL

THE UNIVERSITY OF AKRON VISA PROCUREMENT CARD PROGRAM USER S MANUAL THE UNIVERSITY OF AKRON VISA PROCUREMENT CARD PROGRAM USER S MANUAL PURPOSE The Visa Procurement Card Program has been established as a service to campus departments. This program allows departments the

More information

Internal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D.

Internal Control Risks Associated with Information Technology. Kevin M. Bronner, Ph.D. Internal Control Risks Associated with Information Technology By Kevin M. Bronner, Ph.D. Introduction: The Risk of Information Technology Fraud The information technology (IT) function is important to

More information

Microsoft Confidential

Microsoft Confidential Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft

More information

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6

Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6 Table of Contents Data Analysis Then & Now 1 Changing of the Guard 2 New Generation 4 Core Data Analysis Tasks 6 Data Analysis Then & Now Spreadsheets remain one of the most popular applications for auditing

More information

As just mentioned, exceptions to the Business and Travel Expense policy are allowed if there has been approval by the designated departmental finance

As just mentioned, exceptions to the Business and Travel Expense policy are allowed if there has been approval by the designated departmental finance Hello and welcome to the Expense Approvers training presentation. It is expected that if you are reviewing this presentation, you have already reviewed the Business & Travel Expense Policy Overview presentation.

More information

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances

ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3

More information

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...

More information

Fraud Prevention and Detection in a Manufacturing Environment

Fraud Prevention and Detection in a Manufacturing Environment Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse

More information

Comparison of Generalized Audit Software

Comparison of Generalized Audit Software Comparison of Generalized Audit Software In today s modern and computerized world even small companies have huge numbers of financial transactions going through the books. As an (external) auditor, it

More information

Contract and Procurement Fraud. Vendor Management

Contract and Procurement Fraud. Vendor Management Contract and Procurement Fraud Vendor Management Introduction Organizations must take steps to reduce vendor fraud, including: Conducting vendor due diligence Managing vendor risks via contracts Ensuring

More information

MANUAL AUDIT SAMPLING

MANUAL AUDIT SAMPLING MANUAL AUDIT SAMPLING Sampling is the application of an audit procedure to less than 100% of the items within an account balance or class of transactions for the purpose of evaluating some characteristic

More information

E D M O N T O N ADMINISTRATIVE PROCEDURE

E D M O N T O N ADMINISTRATIVE PROCEDURE DEPARTMENT DELEGATED AUTHORITY CONTACT FINANCIAL SERVICES CHIEF FINANCIAL OFFICER, FINANCIAL SERVICES DEPARTMENT TRAVEL COORDINATORS DEFINITIONS Account Coding A defined list of SAP cost elements used

More information

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,

More information

University Health Network Policy & Procedure Manual Administrative Expense Reimbursement

University Health Network Policy & Procedure Manual Administrative Expense Reimbursement University Health Network Policy & Procedure Manual Administrative Expense Reimbursement Policy At University Health Network (UHN), standards and processes are in place governing reimbursement for expenses

More information

Chapter 19 (4) Cost Behavior and Cost-Volume-Profit Analysis Study Guide Solutions Fill-in-the-Blank Equations

Chapter 19 (4) Cost Behavior and Cost-Volume-Profit Analysis Study Guide Solutions Fill-in-the-Blank Equations Chapter 19 (4) Cost Behavior and Cost-Volume-Profit Analysis Study Guide Solutions Fill-in-the-Blank Equations 1. Variable cost per unit 2. Fixed cost 3. Variable costs 4. Contribution margin 5. Change

More information

Stages of the Audit Process

Stages of the Audit Process Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance

More information

Completing an Accounts Payable Audit With ACL (Aired on Feb 15)

Completing an Accounts Payable Audit With ACL (Aired on Feb 15) AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired

More information

THE CORPORATION OF THE CITY OF WINDSOR POLICY

THE CORPORATION OF THE CITY OF WINDSOR POLICY THE CORPORATION OF THE CITY OF WINDSOR POLICY Primary Owner: Finance Policy No.: CS.A3.06 Secondary Owner: n/a Approval Date: Feb 18, 2014 Approved By: M103-2014 Subject: TRAVEL AND BUSINESS Effective

More information

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM

PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.

More information

Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd.

Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd. Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd. Call them the twin peaks of continuity continuous auditing and continuous monitoring. There are certainly similarities

More information

How to Leverage Data Analytics in Healthcare Auditing

How to Leverage Data Analytics in Healthcare Auditing Feature How to Leverage Data Analytics in Healthcare Auditing Unleash the power of the computer to vastly improve your audit reach By Scot Murphy, CFE, CIA, ACDA, and Tom Stec, CIA, ACDA Healthcare auditing

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes

More information

Profit from Big Data flow. Hospital Revenue Leakage: Minimizing missing charges in hospital systems

Profit from Big Data flow. Hospital Revenue Leakage: Minimizing missing charges in hospital systems Profit from Big Data flow Hospital Revenue Leakage: Minimizing missing charges in hospital systems Hospital Revenue Leakage White Paper 2 Tapping the hidden assets in hospitals data Missed charges on patient

More information

Fraud Triangle Analytics Anti-Fraud Research and Methodologies

Fraud Triangle Analytics Anti-Fraud Research and Methodologies Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection

More information

10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process

10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process 10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control

More information

THE ABC S OF DATA ANALYTICS

THE ABC S OF DATA ANALYTICS THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable

More information

Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014

Internal Audit Testing and Sampling Techniques. Chartered Institute of Internal Auditors May 2014 Internal Audit Testing and Sampling Techniques Chartered Institute of Internal Auditors May 2014 Controls Testing Slide 1 Testing Priorities Risk B1 Risk A1 Risk B2 Risk A2 Risk C2 Risk C1 Controls testing

More information

The purpose of this policy is to set expectations for a system for reimbursing employees for qualifying business expenses.

The purpose of this policy is to set expectations for a system for reimbursing employees for qualifying business expenses. Adopted: July 13, 2009 School Board Review August 25, 2014 (No Change) Contact Person: Executive Director of Finance and Support Services POLICY 412 I. PURPOSE The purpose of this policy is to set expectations

More information

REGIONAL DISTRICT OF CENTRAL KOOTENAY BYLAW NO. 1851

REGIONAL DISTRICT OF CENTRAL KOOTENAY BYLAW NO. 1851 REGIONAL DISTRICT OF CENTRAL KOOTENAY BYLAW NO. 1851 As Amended by Bylaw No. 1905, 2007 As Amended by Bylaw No. 1956, 2008 As Amended by Bylaw No. 2212, 2011 As Amended by Bylaw No. 2294, 2012 As Amended

More information

Internal Audit Risk Planning

Internal Audit Risk Planning Internal Audit Risk Assessment and Audit Planning May 6, 2011 Eric Miles, Partner, CPA, CIA, CFE Ric Jazaie, CPA, CIA MOSS ADAMS LLP 1 Today s Objectives Provide an overview of current internal audit planning

More information

Investigation into the expenses claimed by Stephen Bett, Norfolk Police and Crime Commissioner

Investigation into the expenses claimed by Stephen Bett, Norfolk Police and Crime Commissioner Investigation into the expenses claimed by Stephen, Norfolk Police and Crime Commissioner Independent Investigation Final Report IPCC Reference: 2013/018991 File classification: NOT PROTECTIVELY MARKED

More information

Governance & Policies

Governance & Policies Governance & Policies Effective: July 1, 2009 Administrative Policy TRAVEL EXPENSE REGULATIONS Approved: September 1, 2009 President s Cabinet General Policy These travel expense regulations are applicable

More information

Did the person who incurred the expenses provide the preparer with all of the

Did the person who incurred the expenses provide the preparer with all of the Hello and welcome to the Expense Preparers training presentation. It is expected that if you are reviewing this presentation, you have already reviewed the Business & Travel Expense Policy Overview presentation.

More information

Leveraging Big Data to Mitigate Health Care Fraud Risk

Leveraging Big Data to Mitigate Health Care Fraud Risk Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud

More information

Audit Sampling. HKSA 530 Issued July 2009; revised July 2010

Audit Sampling. HKSA 530 Issued July 2009; revised July 2010 HKSA 530 Issued July 2009; revised July 2010 Effective for audits of financial statements for periods beginning on or after 15 December 2009 Hong Kong Standard on Auditing 530 Audit Sampling COPYRIGHT

More information

Monitoring and Managing Data and Process Quality Using Data Mining: Business Process Management for the Purchasing and Accounts Payable Processes

Monitoring and Managing Data and Process Quality Using Data Mining: Business Process Management for the Purchasing and Accounts Payable Processes Chapter 10 Monitoring and Managing Data and Process Quality Using Data Mining: Business Process Management for the Purchasing and Accounts Payable Processes Daniel E. O Leary Contents 10.1 Introduction...183

More information

Medgar Evers College: Controls Over Bank Accounts. City University of New York

Medgar Evers College: Controls Over Bank Accounts. City University of New York New York State Office of the State Comptroller Thomas P. DiNapoli Division of State Government Accountability Medgar Evers College: Controls Over Bank Accounts City University of New York Report 2015-S-92

More information

Policy Subject: ACQUISITION AND USE OF WIRELESS HANDHELD VOICE AND DATA SERVICES AND EQUIPMENT

Policy Subject: ACQUISITION AND USE OF WIRELESS HANDHELD VOICE AND DATA SERVICES AND EQUIPMENT UNIVERSITY OF WISCONSIN SUPERIOR Policy Subject: ACQUISITION AND USE OF WIRELESS HANDHELD VOICE AND DATA SERVICES AND EQUIPMENT Cabinet Division: Administration & Finance Date Revised: July 2010 I. Background

More information

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009

Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009 Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity

More information

Office of Public Affairs Business Process Audit Final Report

Office of Public Affairs Business Process Audit Final Report Office of Public Affairs Business Process Audit Final Report May 2012 Executive Summary We performed a business process audit of the procurement cards, office supplies purchases, small purchase orders

More information

AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM

AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM BACKGROUND This procedure is for the use and control of purchasing cards (a commercial credit card) for the purpose of obtaining goods and services

More information

PURCHASING CARD RECONCILIATION HANDBOOK PEOPLESOFT FINANCE. Instruction Manual Updated - April 2013

PURCHASING CARD RECONCILIATION HANDBOOK PEOPLESOFT FINANCE. Instruction Manual Updated - April 2013 PURCHASING CARD RECONCILIATION HANDBOOK PEOPLESOFT FINANCE Instruction Manual Updated - April 2013 2 Table of Contents Logging into PeopleSoft Finance page 3 How to Display Transactions: If you are responsible

More information

Fraud: Real Stories, Real People, Real Impact

Fraud: Real Stories, Real People, Real Impact Fraud: Real Stories, Real People, Real Impact Chris Harper, CPA, MBA Senior Manager Types of Fraud Asset misappropriation Fraudulent financial reporting Identity theft Detection Skills The Fraud Triangle

More information

Consideration of Fraud in a Financial Statement Audit

Consideration of Fraud in a Financial Statement Audit Consideration of Fraud in a Financial Statement Audit 151 AU-C Section 240 Consideration of Fraud in a Financial Statement Audit Source: SAS No. 122; SAS No. 128. Effective for audits of financial statements

More information

Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010

Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 Report 7 Appendix 1d Final Internal Audit Report Sundry Income and Debtors (inc. Fees and Charges) Greater London Authority February 2010 This report has been prepared on the basis of the limitations set

More information

BOARD TRAVEL AND EXPENSE POLICY

BOARD TRAVEL AND EXPENSE POLICY BOARD GOVERNANCE POLICY BOARD TRAVEL AND EXPENSE POLICY Introduction System assets, including operating funds and property, must not be left unprotected, inadequately maintained or exposed to unnecessary

More information

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics

ACL EBOOK. Detecting and Preventing Fraud with Data Analytics ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is

More information

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant 281-351-2688

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant 281-351-2688 How to set up a people based accounting system that makes your small business work for you. By Thomas G. Post Certified Public Accountant 281-351-2688 www.texastaxman.com 1 Title How to set up a people

More information

How to gather and evaluate information

How to gather and evaluate information 09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic

More information

LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC.

LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC. LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL FINAL REPORT ON SELECTED INTERNAL CONTROLS RHODE ISLAND LEGAL SERVICES, INC. RNO 140000 Report No. AU 16-05 March 2016 www.oig.lsc.gov TABLE OF CONTENTS

More information

SA 530 AUDIT SAMPLING. Contents. (Effective for audits of financial statements for periods beginning on or after April 1, 2009) Paragraph(s)

SA 530 AUDIT SAMPLING. Contents. (Effective for audits of financial statements for periods beginning on or after April 1, 2009) Paragraph(s) SA 530 AUDIT SAMPLING (Effective for audits of financial statements for periods beginning on or after April 1, 2009) Contents Introduction Paragraph(s) Scope of this SA... 1 2 Effective Date... 3 Objective...

More information

UCSC Pro-Card Administration

UCSC Pro-Card Administration UCSC Pro-Card Administration Presented by IT Audit Program Manager Dave Lane University of California, Santa Cruz July 16 th 2015 Internal Audit Webinar Series Presentation Overview Based on the audit

More information