Fraud Prevention and Detection in a Manufacturing Environment
|
|
|
- Charlotte Della Goodman
- 10 years ago
- Views:
Transcription
1 Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse that organizations lose 7 percent of annual revenues to occupational fraud. This represents a 40 percent increase from the estimate in its 2006 report. In other words, fraud is an increasing risk in an organization s risk portfolio that must be addressed. This is particularly relevant to manufacturing companies. During periods of economic uncertainty, fraudulent activity generally tends to rise. Prior to the current economic crisis, the 2008 ACFE study revealed the following about the manufacturing environment: Manufacturers had the fourth most reported fraud cases and ranked second in total dollars lost. Manufacturers experienced the third highest median loss among all industry groups. In industries with at least 50 reported cases of fraud, the largest median losses occurred in manufacturing. The most common fraud schemes were corruption, fraudulent disbursements and fraudulent statements. Some other interesting facts from the 2008 ACFE report: Typical fraud lasts two years before it is detected. Occupational fraud is more likely to be detected through tips or by accident than by internal audit, internal controls and external audit combined. Lack of adequate internal controls was most commonly cited as the factor that allows fraud to occur. Nearly half of all occupational fraud was committed by personnel in accounting and executive/upper management, with personnel in operations and sales accounting for nearly 30 percent. The implementation of anti-fraud controls, including a robust fraud risk management program, resulted in lower losses.
2 Fraud and misconduct threaten the ability of an organization to build its reputation, wealth and success. Laws and regulations enacted to address previous fraud scandals have charged organizations boards of directors, executive management and internal audit personnel with the responsibility for fraud risk management. However, these laws and regulations have not been sufficiently prescriptive on how to implement controls or programs that address fraud. In light of this, what steps can a manufacturing company take to deter fraud in its organization? Proven strategies include: Assessing the robustness of its fraud risk management program elements Performing a thorough fraud risk assessment of possible scenarios for the organization s environment Preventing and detecting fraud through technology solutions An Effective Fraud Risk Management Program Many organizations have formalized various components of their fraud risk management programs, but have neglected to conduct a thorough assessment of these programs to identify blind spots or weak links. In 2008, The Institute of Internal Auditors (IIA), American Institute of Certified Public Accountants (AICPA), and the ACFE put forth a comprehensive guide, Managing the Business Risk of Fraud: A Practical Guide, that defines key principles and theories for fraud risk management. At a high level, Managing the Business Risk of Fraud details five principles, as well as essential elements that organizations should consider when developing a fraud risk management program: 1 Principle 1: As part of an organization s governance structure, a fraud risk management program should be in place. It should include a written policy (or policies) to convey the expectations of the board of directors and senior management regarding fraud risk. Principle 2: Fraud risk exposure should be assessed periodically by the organization to identify specific potential schemes and events that the organization needs to mitigate. Principle 3: Prevention techniques to avoid potential key fraud risk events should be established, where feasible, to mitigate the possibility of damage to the organization. Fraud Risk Management Program Elements Roles and responsibilities Commitment Fraud awareness Affirmation process Conflicts disclosure Fraud risk assessment Reporting procedures and whistleblower protection Investigative process Corrective action Quality assurance Continuous monitoring 1 Managing the Business Risk of Fraud: A Practical Guide, 2008, publication sponsored and co-developed by the American Certified Fraud Examiners ( the American Institute of Certified Public Accountants ( and The Institute of Internal Auditors ( Protiviti 2
3 Principle 4: Detection techniques should be established to uncover fraud events in case preventive measures fail or unmitigated risks are realized. Principle 5: A reporting process should be in place to solicit input on potential fraud, and a coordinated approach to investigation and corrective action should be used to help ensure potential fraud is addressed appropriately and in a timely manner. A Thorough Fraud Risk Assessment An essential component of an effective fraud risk management program is the assessment of fraud and misconduct risk. A fraud risk assessment helps management understand areas of the organization that are most susceptible to fraud by ascertaining where potential fraud and misconduct could occur, who might commit such acts and what controls are in place to mitigate such risk. There is no one size fits all approach to conducting a fraud risk assessment for manufacturing organizations. Size, structure and geographic location are important factors in determining who participates in a fraud risk assessment, as well as how fraud risk is identified and then evaluated by management. An effective fraud risk assessment process incorporates the following: Identification of inherent fraud risks by developing fraud scenarios for the organization with input from board members, management and process owners Assessment of likelihood and significance of inherent fraud risks based on interviews with management and process owners, volume of transactions, significance to financial reporting, subjectivity, complexity of underlying transactions, and historical information, among other factors Identification of mitigating controls for fraud and misconduct risks rated as medium- to high-risk and assessment of controls effectiveness at reducing risk to a residual risk level that is acceptable to management Identification of gaps and performance of a cost-benefit analysis to determine whether the organization can implement preventive or detective measures Protiviti 3
4 The following table details just some of the many examples of fraud risk within a manufacturing environment. Method of Fraud Classification Potential Red Flags Corruption Conflicts of interest Bribery Illegal gratuities Abnormal vendor selection Complaints from bidders/suppliers Price outliers on awarded contracts Close association with suppliers (including gifts and social events) Common names or addresses of payees or customers Vague terms in cost-plus contracts No right to audit clause in contracts Contracts not reviewed by legal, supervisor or other party independent of buyer Returns/deductions trends by customer Fraudulent disbursements Fraudulent statements Billing schemes Expense reimbursement schemes Check tampering Asset overstatements Revenue overstatements Payments outside the accounting system (including manual checks and petty cash) Unusual payment patterns Missing documents/support for payment requests Alterations on documents (e.g., backdating) Increase in spot buys Consistent invoice amounts under certain approved thresholds High level of related party transactions Results that continually outperform expectations Increased shipments at period end and/or customer returns after period end Short payments on receivables Unexplained reconciling items Inconsistent, vague or implausible responses arising from inquiries or analytical procedures Missing inventory or physical assets, including an increase in physical inventory count differences (wall-to-wall or cycle) Difficulty in collecting receivables Sizable inventory increase without comparable sales increases Protiviti 4
5 Detecting Fraud Through Technology Solutions Techniques to help detect fraud within manufacturing organizations encompass a variety of manual and automated solutions, which are dependent upon technology systems, as well as the availability of accurate data. More manufacturing organizations have found it is necessary to employ techniques to analyze large amounts of data effectively and efficiently in order to eliminate the human error associated with manual controls. Enterprise resource planning (ERP) applications, such as SAP and Oracle, are widely used by manufacturing companies and should be part of the first line of defense in helping to monitor for fraud risk. While segregation of duties (SoD) is often relied upon by management as an internal control, many companies today do not manage their security processes effectively, and SoD issues proliferate across the enterprise. It is not uncommon to find many ERP users with broad access to sensitive data and the ability to enter conflicting transactions, such as creating a vendor and vendor payments. Given the size of many organizations and the complexity of leading ERP systems, it is virtually impossible to manage SoD properly without some type of SoD or identity management tool to complement the ERP system. In addition, configurable controls are the user-defined settings in an ERP system that determine tolerance limits and ranges, data integrity checks, data field requirements and workflow approvals, among other areas. Typically, these are not configured correctly when the software is shipped, and often, from a compliance standpoint, they are configured poorly during implementation. Through a detailed review of configurable controls, companies can take full advantage of the controls built into the software and strengthen the checks and balances that will help prevent fraud. Another valuable mechanism to assist internal auditors in combating fraud is through data analysis or computer-assisted audit techniques (CAATs). The early detection of fraud schemes can help control an organization s losses and may prevent the escalation of a fraud event into the national spotlight. Through implementing data analysis or CAATs, there is strong potential for companies to reduce the burden of manual-intensive testing while achieving more valuable results and enhancing the monitoring of fraud-related risks. Several fraud scenarios that may go undetected during limited sampling, manual testing can be uncovered through the use of data analysis. Of note, Protiviti conducts an annual Internal Audit Capabilities and Needs Survey that includes responses from hundreds of chief audit executives, internal audit directors and other professionals. In the most recent study, respondents ranked CAATs and continuous auditing as the top audit process areas in need of improvement. 2 Data analysis provides the ability to look into 100 percent of the population, which can include years of transactions. This ability offers the advantage of trending transactions, using tools such as the Benford Analysis, which identifies deviations between actual and expected occurrences of transaction dollar amounts. These analytics enable auditors to focus their efforts on nonroutine or unusual transactions, increasing the likelihood of detection of fraudulent occurrences. 2 For more information, read Protiviti s 2009 Internal Audit Capabilities and Needs Survey, available at Protiviti 5
6 Following are common analytics used in a manufacturing environment: Examples of Data Analytics in a Manufacturing Environment Cash Disbursements Inventory Sales/Accounts Receivable Check validity of payments made to P.O. boxes. Identify checks out of sequence. Identify vendors who are also employees. Identify duplicate payments via manual checks. Identify purchases just under the dollar limit that require additional approval. Identify unusually close sequential patterns of invoice numbers. Identify vendors with the same address. Verify existence of vendors with common names. Identify duplicate invoices. Extract invoices posted with duplicate purchase orders. Identify duplicate SKU numbers and description or cost. Analyze the difference between standard costs and actual costs. Divide inventory into classes and compare percent investment. Reconcile unmatched pay and remittances to freight invoices. Report on items with high value balances and age. Assess the financial viability of LIFO versus FIFO management. Extract products with zero quantities or zero prices. Identify obsolete inventory by sorted turnover analysis. Isolate stock lines where the cost is greater than retail price. Compare inventory levels and turnover rates. Review associate purchases for large amounts. Determine return rates for promotional products. Identify high-volume refund customers. Identify higher than average returns over time. Identify refunds paid to company employees. Review customers with a significant percentage of low or negative margins. Identify duplicate invoices. Identify all customers in sales who are not in accounts receivable. Identify any customers with no phone number. Identify accounts without collector assignments. Identify any customers with a contact phone number the same as the company s. Conclusion Industry statistics show that fraud is on the rise and that manufacturing organizations are particularly susceptible. As a result, the risk and associated cost of fraud to companies is on the rise as well. Therefore, manufacturing organizations should ensure that management has an appropriate focus on fraud risk management, including: Proactively assessing compliance with leading practices and elements, focusing on understanding the key threats and vulnerabilities of fraud to the organization Leveraging or implementing preventive and detective fraud controls built into existing technology systems Utilizing detective analysis techniques to determine whether the preventive mechanisms are operating as intended Protiviti 6
7 About Protiviti Protiviti ( is a global business consulting and internal audit firm composed of experts specializing in risk, advisory and transaction services. We help solve problems in finance and transactions, operations, technology, litigation, governance, risk, and compliance. Our highly trained, results-oriented professionals provide a unique perspective on a wide range of critical business issues for clients in the Americas, Asia-Pacific, Europe and the Middle East. Protiviti has more than 60 locations worldwide and is a wholly owned subsidiary of Robert Half International Inc. (NYSE symbol: RHI). Founded in 1948, Robert Half International is a member of the S&P 500 index. About Our Industrial Products Practice Protiviti s Industrial Products professionals can assist your company with strengthening compliance efforts, information for decision-making and business processes to improve overall performance and lower costs. Some of the many challenges management faces in the manufacturing environment include supply interruption, customer dissatisfaction, bottlenecks in the supply chain, forecasting issues, excess and obsolete inventory, quality concerns, work stoppages and an inadequate ERP system. Industrial products companies understand these concerns because of the complex supply chains they have that deliver value to end customers. Combined with regulatory requirements, these companies need to manage an ever-challenging landscape of operating risks. At Protiviti, our professionals understand the issues your organization is facing. Our solutions will help you deal with, overcome and turn your issues into competitive advantages. We combine industry competency with internal audit, corporate governance, diagnostics, process design and cost-optimization to help you achieve a competitive advantage. For additional information about the issues reviewed in this white paper or Protiviti s services, please contact: Sharon Lindstrom Managing Director [email protected] 2009 Protiviti Inc. An Equal Opportunity Employer. Protiviti is not licensed or registered as a public accounting firm and does not issue opinions on financial statements or offer attestation services.
Process Control Optimisation with SAP
Process Control Optimisation with SAP The procure-to-pay cycle, which includes all activities from the procurement of goods and services to receiving invoices and paying vendors, is a basic business process.
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd.
Continuous Monitoring and Auditing: What is the difference? By John Verver, ACL Services Ltd. Call them the twin peaks of continuity continuous auditing and continuous monitoring. There are certainly similarities
High Value Audits: An Update on Information Technology Auditing. Robert B. Hirth Jr., Managing Director
High Value Audits: An Update on Information Technology Auditing Robert B. Hirth Jr., Managing Director The technology landscape and its impact on internal audit Technology is playing an ever-growing role
Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations
Preventing Fraud: Assessing the Fraud Risk Management Capabilities of Today s Largest Organizations Overview In late 2006 and 2007, Protiviti commissioned a study to gauge the fraud risk management (FRM)
Customer Data and Reputational Risk in the Pharmaceutical Industry
1 Customer Data and Reputational Risk in the Pharmaceutical Industry Sensitive Data: A Chain of Trust Organizations of all types, from banks to government agencies to healthcare providers, are taking steps
Capital Projects and Construction: Building in Risk Management and Project Controls
Capital Projects and Construction: Building in Risk Management and Project Controls Making Every Dollar Count The global economic crisis sparked by the subprime mortgage debacle, the collapse of the securitized
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
Chapter 15 Auditing the Expenditure Cycle
Chapter 15 Auditing the Expenditure Cycle Expenditure cycle consists of activities related to the acquisition of and payment for plant assets and goods and services. Two major transaction classes: 1 purchases
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE
FRAUD RISK MANAGEMENT PROGRAM SHERYL VACCA SENIOR VICE PRESIDENT AND CHIEF COMPLIANCE AND AUDIT OFFICER MIKE JENSON UCR AUDIT DIRECTOR SESSION OBJECTIVE AND OUTLINE Assist campus managers in the development
PROTIVITI FLASH REPORT
PROTIVITI FLASH REPORT California Law Requires Companies to Disclose Efforts to Ensure Supply Chains Are Free of Slavery and Human Trafficking February 6, 2012 The California Transparency in Supply Chains
SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned
SAP BusinessObjects GRC Access Control 10.0 New Feature Highlights and Initial Lessons Learned Executive Summary Organizations evaluating technology solutions to enhance their governance, risk and compliance
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
Proactive Risk Management with SAP BusinessObjects
Proactive Risk Management with SAP BusinessObjects Leveraging Technology to Gain Enterprise Transparency and Rapid Insight into Changing Business Conditions INTRODUCTION What is the totality of our enterprise
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma
S24 - Governance, Risk, and Compliance (GRC) Automation Siamak Razmazma Governance, Risk, Compliance (GRC) Automation Siamak Razmazma [email protected] September 2009 Agenda Introduction to
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter. October 1, 2009
Auditing for Value in the Procure to Pay Cycle Dallas IIA Chapter October 1, 2009 Supply Chain Risk Overview * Today s Focus * Includes Working Capital benefits 1 2009 Protiviti Inc. An Equal Opportunity
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
An Introduction to Continuous Controls Monitoring
An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc
SEC FLASH REPORT. SEC Issues Rules for Implementing the Whistleblower Provisions of Section 21F of the Securities Exchange Act of 1934
SEC FLASH REPORT SEC Issues Rules for Implementing the Whistleblower Provisions of Section 21F of the Securities Exchange Act of 1934 May 25, 2011 Today, the Securities and Exchange Commission (SEC) voted
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER
MAY 13, 2014 IIA AUSTIN CHAPTER 2014 by the Association of Certified Fraud Examiners, Inc. Revised: 3/26/14 No portion of this work may be reproduced or transmitted in any form or by any means electronic
www.pwc.com Being protected Using data analytics to detect fraud
www.pwc.com Being protected Using data analytics to detect fraud Are you currently exposed to fraudulent activities? It will surprise few to learn that occupational fraud, IP infringement, corruption,
TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL
TECHNOLOGY YOU CAN USE AGAINST THOSE WHO USE TECHNOLOGY FRAUD ANALYTICS: TAKING DATA ANALYSIS TO THE NEXT LEVEL With the large volumes of data handled by organizations today, the ability to analyze this
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE
Developing and Implementing a Fraud Risk Assessment Josh Shilts CPA/CFF, CFE MY GOAL HAVE YOU WALK AWAY WITH THE KNOWLEDGE AND TOOLS TO COMPLETE A FORMAL & USEFUL FRAUD RISK ASSESSMENT!!! Before We Begin,
How To Get A Tech Startup To Comply With Regulations
Agile Technology Controls for Startups a Contradiction in Terms or a Real Opportunity? Implementing Dynamic, Flexible and Continuously Optimized IT General Controls POWERFUL INSIGHTS Issue It s not a secret
GOVERNANCE, RISK AND COMPLIANCE. Internal Audit. Assessing Fraud Vulnerabilities. kpmg.com/in
GOVERNANCE, RISK AND COMPLIANCE Internal Audit Assessing Fraud Vulnerabilities kpmg.com/in 1 Internal Audit Assessing Fraud Vulnerabilities Introduction Globalization has increased the scale and complexity
How To Find Out If A Company Misstatement Is True
A U D I T I N G A RISK-BASED APPROACH TO CONDUCTING A QUALITY AUDIT 9 th Edition Karla M. Johnstone Audrey A. Gramling Larry E. Rittenberg CHAPTER 11 AUDITING INVENTORY, GOODS AND SERVICES, AND ACCOUNTS
PROTIVITI FLASH REPORT
PROTIVITI FLASH REPORT Even Retailers and Consumer Products Manufacturers Must Manage Compliance with the U.S. Foreign Corrupt Practices Act and Other Anti-Bribery Laws May 3, 2012 Recent reports of alleged
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
Fraud Risk Management providing insight into fraud prevention, detection and response
Fraud Risk Management providing insight into fraud prevention, detection and response For private circulation only www.deloitte.com/in Fraud follows opportunity and attacks weakness. Know where you are
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER
Vendor Audit and Cost Recovery: Improving Bottom Line Results WHITE PAPER 2002 ACL Services Ltd. All rights reserved. AMWE109003 ACL and the ACL logo are registered trademarks of ACL Services Ltd. All
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
Fraud Prevention Training
Fraud Prevention Training Kim Turner, Chief Audit Executive Emily Knopp, Audit Director Fraud Prevention: WHAT YOU WILL LEARN & FRAUD FACTS What you will take away with you: Glossary of Fraud Terms Details
Misplaced Trust: Vendor Fraud. IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager
Misplaced Trust: Vendor Fraud IIA/ACFE Conference Patrick Mitchell, Managing Director Sharon Delgado, Senior Manager April 17, 2015 Today s Discussion Summary Vendor fraud is a form of occupational fraud
September 28, 2011. Audit s Role in Governance, Risk Management and Internal Control
September 28, 2011 Internal Audit Overview Audit s Role in Governance, Risk Management and Internal Control Mission Provide independent, objective assurance and advisory services designed to add value
Guide to Internal Control Over Financial Reporting
Guide to Internal Control Over Financial Reporting The Center for Audit Quality prepared this Guide to provide an overview for the general public of internal control over financial reporting ( ICFR ).
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?
From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
Financial Services Group
Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be
Procurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING. A CaseWare IDEA Research Report
DATA ANALYSIS: THE CORNERSTONE OF EFFECTIVE INTERNAL AUDITING A CaseWare IDEA Research Report CaseWare IDEA Inc. is a privately held software development and marketing company, with offices in Toronto
SUBSIDIARY LEDGER MANAGEMENT AND INTERNAL CONTROLS
SUBSIDIARY LEDGER MANAGEMENT AND INTERNAL CONTROLS Introduction: A critical component of the University s internal control environment over financial transactions is the departmental subsidiary ledger
Auditing Capital Projects and Project Controls. March 2013
Auditing Capital Projects and Project Controls March 2013 Internal Audit Perspective Oversight Insight Foresight Is the process operating as planned? Are controls, resources, and performance measures adequate
Financial Close Optimization: Five Steps for Identifying and Resolving Systems and Process Inefficiencies
Financial Close Optimization: Five Steps for Identifying and Resolving Systems and Process Inefficiencies Introduction A recent survey by the Institute of Management Accountants found that financial closing
Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes
REMEDYNE Continuous Monitoring Document Version: Rel. 1.6 2015-09- 07 Continuous Monitoring and Case Management For SAP: Prevent Errors and Fraud in your most important Business Processes TABLE OF CONTENTS
Part of the Deloitte working capital series. Make your working capital work for you. Strategies for optimizing your accounts payable
Part of the Deloitte working capital series Make your working capital work for you Strategies for optimizing your accounts payable The Deloitte working capital series Strategies for optimizing your accounts
IPPF Practice Guide. Internal Auditing and Fraud
IPPF Practice Guide Internal Auditing and Fraud December 2009 IPPF Practice Guide Table of Contents Introduction... 1 Executive Summary... 2 Definition of Fraud... 4 Fraud Awareness... 5 A. Reasons for
Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner [email protected] 210.268.1932 AGENDA
Fraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be
Fraud Checklist Client Name Disclosing entity Prepared by Reviewed by Partner review Balance Date Close Monitoring Date Date Date How to use this checklist An initial assessment of the risk that irregularities
Practical Guidance for Market Participants in the Gold and Precious Metals Industry
Practical Guidance for Market Participants in the Gold and Precious Metals Industry Version 1 - April, 2012 Content Introduction 1 Step 1 3-5 Establishing robust company supply chain management systems
Module # 2 Management/Key Employee Assessment
Module # 2 Management/Key Employee Assessment The management/key employee assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Internal
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process
10-1 Auditing Business Process Auditing Business Process Objectives Understand the Auditing of the Enteties Business Process Identify the types of transactions in different Business Process Asses Control
B Resource Guide: Implementing Financial Controls
What s in this Guide: I. Definition: What are Financial Controls? II. Why Do You Need Financial Controls? III. Best Practices: Financial Controls to Consider I. Definition: What are Financial Controls?
Audit Program for Accounts Payable and Purchases
Form AP 50 Index Audit Program for Accounts Payable and Purchases Legal Company Name Client: Balance Sheet Date: Instructions: The auditor should refer to the audit planning documentation to gain an understanding
IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP
IT Audit Perspective on Continuous Auditing/ Continuous Monitoring KPMG LLP IT Audit Perspective on Continuous Auditing/Continuous Monitoring INTRODUCTION New demands from the board, senior organizational
Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained
Performing Audit Procedures in Response to Assessed Risks 1781 AU Section 318 Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained (Supersedes SAS No. 55.)
These are some labor burden test queries that auditors can make if they have the contractor s or vendor s labor burden breakdown:
Applying Data Mining and Analytics to Efficiently Audit Vendors and Contractors By Paul Pettit, Protiviti Inc. Each year, companies spend billions of dollars to start up, operate and maintain their businesses
Fraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
Fraud Risk Management
Fraud Risk Management Overview Discussion Questions 1) Does your organization follow a specific risk management model? If so, which one? Do you think this model adequately addresses the risks your organization
PMS 288 Blue or CMYK = C100-M85-Y0-C43 PMS 1255 Ochre / Yellow or CMYK = C0-M35-Y85-C30. Tax Technology
PMS 288 Blue or CMYK = C100-M85-Y0-C43 PMS 1255 Ochre / Yellow or CMYK = C0-M35-Y85-C30 Tax Technology PO Ryan has provided BASF outstanding value by recovering overpaid taxes while identifying and implementing
Products Currency Supply Chain Management
Products Currency Supply Chain Management Today s Enterprises Need Intelligent and Integrated Solutions to Optimize Currency Levels, Reduce Expenses and Improve Control Products The financial services
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2014 Global Fraud Study Letter from the President & CEO In 1988, Dr. Joseph T. Wells founded the ACFE with a stated mission to reduce the incidence
SECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
Stages of the Audit Process
Chapter 5 Stages of the Audit Process Learning Objectives Upon completion of this chapter you should be able to explain: LO 1 Explain the audit process. LO 2 Accept a new client or confirming the continuance
SHARED SERVICES. An Enabler for Managing Risk. Steve Tracy, Principal Consultant, ISG. www.isg-one.com
SHARED SERVICES An Enabler for Managing Risk Steve Tracy, Principal Consultant, ISG www.isg-one.com INTRODUCTION During the last few years, companies have become increasingly focused on the need for effective
Managing Regulatory Compliance and AML Risk in a Virtual Currency World
Managing Regulatory Compliance and AML Risk in a Virtual Currency World Issue When you first think of virtual currency (also known as digital currency), the video gaming industry may be what first comes
Operational Risk Management Program Version 1.0 October 2013
Introduction This module applies to Fannie Mae and Freddie Mac (collectively, the Enterprises), the Federal Home Loan Banks (FHLBanks), and the Office of Finance, (which for purposes of this module are
Weaknesses in the Smithsonian Tropical Research Institute s Financial Management Require Prompt Attention
Weaknesses in the Smithsonian Tropical Research Institute s Financial Management Require Prompt Attention Office of the Inspector General Report Number A-13-01 October 29, 2013 INTRODUCTION This report
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing
Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing Executive Summary As cloud service providers mature, and expand and refine their offerings, it is increasingly difficult for
