FRAUD RISK ASSESSEMENT GOVERNANCE, RISK AND CONTROL CONFERENCE 29 August 2014, Lusaka, Zambia
|
|
|
- Kristina Reed
- 10 years ago
- Views:
Transcription
1 FRAUD RISK ASSESSEMENT GOVERNANCE, RISK AND CONTROL CONFERENCE 29 August 2014, Lusaka, Zambia Nchimunya Chisuta CFE, FCCA, FZICA Regional Audit Director Southern Africa, World Vision Int.
2 Fraud Risk Assessment Agenda - Process of Identifying and Analysing Risks (Sample Fraud Risk Assessment tool) - Brief background of what constitutes fraud - Share Resources tools to utilise in fraud risk management - Common challenges in Effective Fraud Risk Assessment Fraud Risk Exposure
3 IMPORTANCE OF THIS SESSION Effective risk assessment is increasingly Important to the success of any business Relationship of Fraud Risk assessment with enterprise risk management program Training received is a very good basis for implementing an anti-fraud programme. A trained leader/staff/entrepreneur is an important asset The environment and business world we operate requires responsible persons in positions of authority to lead the way with knowledge on fraud and set the tone at the top. Examples of current statistics:
4 Awareness on Global Trends Source: Global Corruption Barometer 2013 Key findings from 114,000 respondents in 107 countries: Bribes: Overall, more than one in four people (27%) report having paid a bribe in the last 12 months when interacting with key public institutions and services. The police and the judiciary are seen as the two most bribery prone. An estimated 31 per cent of people who came into contact with the police report having paid a bribe. 27% with Judiciary Governments are not thought to be doing enough to hold the corrupt to account The democratic pillars of societies are viewed as the most corrupt around the world, political parties, the driving force of democracies, are perceived to be the most corrupt institution.
5 Awareness on Global Trends Source: Global Corruption Barometer 2013 Powerful groups rather than the public are judged to be driving government actions. More than one in two people (54 per cent) think their government is largely or entirely run by groups acting in their own interests rather than for the benefit of the citizens. People state they are ready to change this status-quo in the fight against fraud. Nearly 9 in 10 surveyed say they would act against corruption 53 per cent of people surveyed think that corruption has increased or increased a lot over the last two years. This was the case in In Algeria, Lebanon, Portugal, Tunisia, Vanuatu and Zimbabwe, where people indicate that corruption has gotten much worse, with three out of four indicating an increase in corruption
6 Awareness on Global Trends ACFE reports that the average total cost of fraud in a corporate org. is equivalent to 7% of the annual revenues. Failing to address these issues places an org/company at a competitive disadvantage when fraud becomes a cost of doing business
7 FRAUD RISK ASSESSMENT - RESOURCES TO SHARE ( Fraud Control Policy Fraud Risk Assessment Framework Fraud Questionnaires Fraud Surveys Fraud Assessment Checklist Fraud Risk Self Assessment Tool NOTE: These appendix are samples. The information may or may not agree with all the concepts noted within this presentation. The material is being provided as an example that may be a used as a tool, reference, or starting point.
8 FRAUD RISK ASSEMENT What is Fraud? Legal Definition: A false representation of a matter of fact, whether by words or by conduct, by false or misleading allegations, or by concealment of what should be disclosed, that deceives and is intended to deceive so that the individual will act upon it to her or his legal injury Fraud is a type of criminal activity in simple words the abuse of entrusted power for gain. Fraud, by definition, entails intentional misconduct, designed to evade detection. As such, a fraud risk assessment team should engage in strategic reasoning to anticipate the behaviour of a potential fraud perpetrator. *** Fraud falls into these 3 main categories: ***Using Game Theory and Strategic Reasoning Concepts to Prevent and Detect Fraud, Accounting Horizons, Volume 18
9 Asset Misappropriation Cash Non Cash Corruption Bribery Conflict of Interest Extortion Financial Statement
10 Purpose of Risk Assessment Risk assessment is intended to provide management with a view of events that could impact the achievement of objectives. It is best integrated into existing management processes and should be conducted using a top-down approach that is complemented by a bottom-up assessment process. Boards of directors and particularly board audit committees often request enterprise-wide risk assessments to ensure that key risks are identified and duly addressed. Such risk assessments should not be disconnected from other assessments performed within the organization. The internal audit function, for instance, may be assessing risks to plan its audits for the year. The finance function may look at similar information to perform its risk-based scoping. Business units may also be assessing risks from a business planning or performance management perspective. These individual assessments should be aligned (e.g., using common terminology, risk categories, and congruent outcomes), to cover key objectives, and be integrated to contribute to an enterprise-wide risk assessment.
11 Types of Risk Assessments Strategic risk assessment. Evaluation of risks relating to the organization s mission and strategic objectives, typically performed by senior management teams in strategic planning meetings, with varying degrees of formality. Operational risk assessment. Evaluation of the risk of loss (including risks to financial performance and condition) resulting from inadequate or failed internal processes, people, and systems, or from external events. Compliance risk assessment. Evaluation of risk factors relative to the organization s compliance obligations, considering laws and regulations, policies and procedures, ethics and business conduct standards, and contracts, as well as strategic voluntary standards and best practices to which the organization has committed. This assessment is typically performed by the compliance function with input from business areas. Financial statement risk assessment. Evaluation of risks related to a material misstatement of the organization s financial statements through input from various parties such as the controller, internal audit, and operations.
12 Types of Risk Assessments - continued Internal audit risk assessment. Evaluation of risks related to the value drivers of the organization, covering strategic, financial, operational, and compliance objectives. This top-down approach enables the coverage of internal audit activities to be driven by issues that directly impact shareholder and customer value, with clear and explicit linkage to strategic drivers for the organization. Market risk assessment. Evaluation of market movements that could affect the organization s performance or risk exposure, considering interest rate risk, currency risk, option risk, and commodity risk. This is performed by market risk specialists. Credit risk assessment. Evaluation of the potential that a borrower or counterparty will fail to meet its obligations in accordance with agreed terms. This considers credit risk inherent to the entire portfolio as well as the risk in individual credits or transactions. Conducted typically by credit analysts
13 Types of Risk Assessments - Continued Customer risk assessment. Evaluation of the risk profile of customers that could potentially impact the organization s reputation and financial position. This assessment weighs the customer s intent, creditworthiness, affiliations, and other relevant factors. This is typically performed by account managers, using a common set of criteria and a central repository for the assessment data. Product risk assessment. Evaluation of the risk factors associated with an organization s product, from design and development through manufacturing, distribution, use, and disposal. This assessment aims to understand not only the revenue or cost impact, but also the impact on the brand, interrelationships with other products, dependency on third parties, and other relevant factors. This type of assessment is typically performed by product management groups.
14 Types of Risk Assessments - Continued Security risk assessment. Evaluation of potential breaches in an organization s physical assets and information protection and security. This considers infrastructure, applications, operations, and people, and is typically performed by an organization s information security function. Information technology risk assessment. Evaluation of potential for technology system failures and the organization s return on information technology investments. This assessment would consider such factors as processing capacity, access control, data protection, and cyber crime. This is typically performed by an organization s information technology risk and governance specialists. Project risk assessment. Evaluation of the risk factors associated with the delivery or implementation of a project, considering stakeholders, dependencies, timelines, cost, and other key considerations. This is typically performed by project management teams.
15 What is Fraud Risk Assessment? Fraud risk assessment is the evaluation of potential instances of fraud that could impact the organization s ethics and compliance standards, business practice requirements, financial reporting integrity, and other objectives. This is typically performed as part of a broader organization-wide risk assessment, and involves subject matter experts from key business functions where fraud could occur (e.g., procurement, accounting, and sales) as well as forensic specialists e.g. Certified Fraud Examiners (CFEs)
16 FRAUD RISK ASSESSMENT The foundation of an effective fraud risk management program should be seen as a component of a larger enterprise risk management (ERM) effort and is rooted in a risk assessment that identifies where fraud may occur and who the perpetrators might be
17 FRAUD RISK ASSESSMENT Involves asking questions such as: How might a fraud perpetrator exploit weaknesses in the system of controls? How could a perpetrator override or circumvent controls? What could a perpetrator do to conceal the fraud? What has happened in the past? Can we prevent it? Can we catch it right away? Can we handle it?
18 FRAUD RISK ASSESSMENT Involves asking questions such as, where is fraud inherently high: By functional area By position By Relationship
19 FRAUD RISK ASSESSMENT The initial assessment of fraud risk should consider the inherent risk of particular frauds occurring in the absence of internal controls. After all relevant fraud risks have been identified, internal controls are mapped to the identified risks. Fraud risks that remain unaddressed by appropriate controls comprise the population of residual fraud risks. Following this statement, note there are 3 KEY STEPS: 1. Identify inherent fraud risk Gather information to obtain the population of fraud risks that could apply to the organization. Included in this process is the explicit consideration of all types of fraud schemes and scenarios; incentives, pressures, and opportunities to commit fraud; and IT fraud risks specific to the organization.
20 FRAUD RISK ASSESSMENT 2. Assess likelihood and significance of inherent fraud risk Assess the relative likelihood and potential significance of identified fraud risks based on historical information, known fraud schemes, and interviews with staff, including business process owners. 3. Respond to reasonably likely and significant inherent and residual fraud risks Decide what the response should be to address the identified risks and perform a cost-benefit analysis of fraud risks over which the organization wants to implement controls or specific fraud detection procedures
21 FRAUD RISK ASSESSMENT Framework Illustration The framework below illustrates how the elements of fraud risk identification, assessment, and response are applied in a rational, structured approach;
22 FRAUD RISK ASSESSMENT Framework Illustration Identified Fraud Risk Likelihood Significance People /Dept. Existing Anti- Fraud Control Control Effective ness Residual Risks Fraud Risk Exposure Inappropriate journal entries Reasona bly possible Material Finance Standard monthly and quarterly journal entry log maintained Review process in place for standard entries, and nonstandard entries subject to two levels of review Tested by IA Tested by Mgt. Risk of override Unusual Dr/CR combination s
23 FRAUD RISK ASSESSMENT Framework Illustration Identified Fraud Risk Likelihood Significance People /Dept. Existing Anti- Fraud Control Control Effective ness Residual Risks Fraud Risk Exposure Intruders gaining access to the systems using default or weak passwords or stolen and reused credentials. Reasona bly possible Material ICT/All Cobit 5 regular mgt review of all password protected accounts and related privileges and ensure that all users on IT systems (business application, IT infrastructure, system operations, development and maintenance) are uniquely identifiable. Tested by IA Weak logical access control in place Unauthorise d access to key info Define and implement procedures to grant, limit and revoke access to systems, premises, buildings and restricted areas
24 FRAUD RISK ASSESSMENT Framework Illustration Identified Fraud Risk Likelihood Significance People /Dept. Existing Anti- Fraud Control Control Effective ness Residual Risks Fraud Risk Exposure Domineering Board members - Conflicts of interest - moderat e Significant General mgt Annual conflict of interest disclosure Stringent board recruitment and selection policy and processes Tested by external auditors Undeclared conflict of interest Inadequate understandi ng of the roles of the some AC members Lack of Established protocol for disclosure of potential conflicts of interest Poor tone at the top Lack of background checks
25 Fraud Risk Assessment - Common Challenges Not using an Expert (in your group) to help analyse the fraud risk Solution: for fraud risks by area, use subject matter experts Fraud Risk Assessment Viewed as a one off episodic event with no value addition (only conducted for 2-3 years Strategic Plans) Solution: Conduct and update when need arises, but at a minimum twice a year Information and data is hard to use and interpret Solution: Use simple, understandable terms. Review for reasonableness of implementing recommended actions for addressing residual fraud exposure
26 Fraud Risk Assessment - Common Challenges Results of fraud risk assessment are not acted upon Solution: Hold staff/process owner accountable with action plans/deadline for implementation Leaving the role to Risk Mgt and Compliance Unit Solution: Solicit heightened interest from all stakeholders: awareness, training, JDs Risk being over controlled Solution: Prioritise which controls to invest in
27 Fraud Risk Assessment - Common Challenges Too many different risk assessments are performed across the organization Solution: Adopt consistency approach
28 Fraud Risk Management Program Fraud risk assessment. Roles and responsibilities. Commitment. Fraud awareness. Conflict disclosure. Reporting & whistleblower protection. Investigation process. Corrective action. Continuous monitoring Report to the Nations on Occupational Fraud and Abuse, ACFE
29 EFFECTIVE FRAUD RISK ASSESSMENT - AS A DITERRENT THE LARGEST DITERRENT TO FRAUDSTERS: Belief that they will be caught
30 Perception of Detection A major reason why people commit fraud is because they are allowed to do so. The threat of fraud can come from inside or outside the organisation, but the likelihood that a fraud will be committed is greatly decreased if the potential fraudster believes that the rewards will be modest, that they will be detected or that the potential punishment will be unacceptably high.
31 COMPRENSIVE FRAUD EXPOSURE ANALYSIS
32 EFFECTIVE FRAUD HANDLING Response Mechanism Investigation Loss Recovery Effective Reporting to the Board External Authorities Publicity Morale and HR Concerns
33 INVESTIGATIVE RESOURCES Experienced investigators Forensic accounting Computer forensics specialists
34 Based on a survey by the Association of Certified Fraud Examiners (ACFE) Fraud starts small and just gets bigger and bigger, until something becomes noticeably different or unusual
35
36
37
38 NOT ADDRESSING FRAUD From the pictures, it is clear that someone responsible is not doing his job Fraud starts small then grows like a cancer if left unchecked
39 Coachroach Theory When you discover one coachroach, be rest assured
40 ...there more coach roaches hiding!
41 IMPACT OF SOCIAL MEDIA, S Need for Employers to monitor employees s to review extent of potential to fraud/reputational risk issues; Remember all materials are sent and received via s and ICT media using company assets; Defamatory materials Scandalous material Vicarious liability online chat rooms, social networking sites, hoax websites, fake ads etc
42 Syndicates In addition to individual fraudsters, there has also been an increase in the last decade in cyber fraud being committed by gangs of organised criminals. Examples include false or stolen identities being used to defraud banks, and forms of e-fraud exploiting the use of internet by commercial businesses. These complex syndicates have established structures (need to know basis meetings), business plans, long term vision statements, funding etc. 1. Leaders 2. Hard core established criminals 3. Organisers 4. Mules
43 Detection of Syndicate Crime & ID fraud Most vulnerable departments are: Back office, voucher processing, ICT ICT department Globally now targeting telecoms Phishing s Sim Swops Using former employees Reaching out to insider staff with addiction problems (loan sharks, tribal connections) Using applications like team viewer Watch out for use of Key loggers
44 Key loggers
45
46 QUESTIONS?
47 CONTACT DETAILS Mr. Nchimunya Chisuta Cell: Skype: nchisuta1 or
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Fraud Prevention and Deterrence
Fraud Prevention and Deterrence Fraud Risk Assessment 2016 Association of Certified Fraud Examiners, Inc. What Is Fraud Risk? The vulnerability that an organization faces from individuals capable of combining
A Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS European Security Conference & Exhibition Gothenburg, April 15, 2013 Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic Crime
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Fraud and the Government Internal Auditor
Fraud and the Government Internal Auditor January 2012 Fraud and the Government Internal Auditor January 2012 Official versions of this document are printed on 100% recycled paper. When you have finished
Fraud Risk Management Procedures
Fraud Risk Management Procedures 1. Introduction KCE Electronics Public Company Limited ( KCE or the Company ) is committed to achieving the highest levels of business integrity, morals and transparency
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Module 6 Documenting Processes and Controls
A logical place to begin any comprehensive evaluation of internal controls is at the top entity-level controls that might have a pervasive effect on the organization. This includes a consideration of factors
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
Annual Governance Statement 2013/14
31 Annual Governance Statement 2013/14 1. SCOPE OF RESPONSIBILITY ESPO is responsible for ensuring that its business is conducted in accordance with the law and proper standards, and that public money
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
CODE OF CONDUCT Ethical rules and guidelines
CODE OF CONDUCT Ethical rules and guidelines CONTENT Introduction... 3 Our customers... 5 Employees... 7 The world around us... 9 Communication & dialog... 11 Security, theft & loss... 13 Environment...
Fraud-Related Compliance
Fraud-Related Compliance Areas of Compliance, Part 1: FCPA, SOX, PCAOB, Dodd-Frank 2015 Association of Certified Fraud Examiners, Inc. Foreign Corrupt Practices Act (FCPA) Enacted to prohibit corrupt payments
Fraud Control Theory
13 Fraud Control Theory Using a variation of a saying from the 1960s, fraud happens. Like all costs of doing business, fraud must be managed. Management must recognize that people commit fraudulent acts
Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students
NIJ Special Report Education and Training in Fraud and Forensic Accounting: A Guide for Educational Institutions, Stakeholder Organizations, Faculty and Students NOTE: The following is based on an exposure
Fraud and Role of Information Technology. September 2008
Fraud and Role of Information Technology September 2008 Agenda IT Value Proposition Slide 2 Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU)
FRAUD PREVENTION STRATEGY FOR UGU DISTRICT MUNICIPALITY (UGU) CONTENTS 1. Introduction.. 3 2. Characteristics of Fraud.. 5 3. Fraud Strategy..... 6 4. Building the Fraud Prevention Plan........ 8 Fraud
Bribery Policy. Policy description:
Bribery Policy Policy description: This purpose of this document is to set out the College policy in relation to Bribery. The policy also outlines the College s approach to gifts received by the College
PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET
Graduate Council Document 08-41a Approved by the Graduate Council on May 6, 2010 PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING & FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Proposal
Transmittal Letter... 1. Objectives and Scope... 2. Approach... 3-7. Financial System... 8. Permitting Application... 9
Internal Audit Committee of Information Technology Risk Assessment Public Report Prepared By: Internal Auditors of Brevard County September 30, 2009 Table of Contents Transmittal Letter... 1 Objectives
SPG 223 Fraud Risk Management. June 2015
SPG 223 Fraud Risk Management June 2015 Disclaimer and copyright This prudential practice guide is not legal advice and users are encouraged to obtain professional advice about the application of any legislation
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 Introduction THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS (Effective for audits of financial statements for
Fraud Prevention Policy
FRAUD PREVENTION POLICY 1. Purpose 1.1. This policy sets out the general principles and minimum requirements for managing fraud risks across the Amcor Group and all its member and affiliated companies
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
Fraud Risk Management
Fraud Risk Management Overview Discussion Questions 1) Does your organization follow a specific risk management model? If so, which one? Do you think this model adequately addresses the risks your organization
CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015
GOLDFIELDS MONEY LIMITED ACN 087 651 849 CODE OF CONDUCT as adopted by the Board of Directors on 20 February 2015 1. Purpose This Code of Conduct (Code) clearly states the standards of responsibility and
IPPF Practice Guide. Internal Auditing and Fraud
IPPF Practice Guide Internal Auditing and Fraud December 2009 IPPF Practice Guide Table of Contents Introduction... 1 Executive Summary... 2 Definition of Fraud... 4 Fraud Awareness... 5 A. Reasons for
FEI Canada. Fraud Prevention. Presented by: Matthew McGuire and Leigh Beijer. Date:
FEI Canada Fraud Prevention Presented by: Date: Matthew McGuire and Leigh Beijer June 11, 2015 Agenda Presenter Introductions Overview Elements of a fraud program Investigating Fraud Page 2 Presenter Introductions
SCHOOLS FRAUD RESPONSE PLAN
SCHOOLS FRAUD RESPONSE PLAN Author Jean Gleave, Chief Internal Auditor Date Last Agreed May 2012 Review Date May 2014 1 WARRINGTON BOROUGH COUNCIL SCHOOLS FRAUD RESPONSE PLAN Introduction The purpose of
Aberdeen City Council IT Security (Network and perimeter)
Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary
Enterprise Risk Management
Cayman Islands Society of Professional Accountants Enterprise Risk Management March 19, 2015 Dr. Sandra B. Richtermeyer, CPA, CMA What is Risk Management? Risk management is a process, effected by an entity's
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner [email protected] 210.268.1932 AGENDA
Leonard W. Vona, CPA, CFE
Leonard W. Vona, CPA, CFE Certified Public Accountant Certified Fraud Examiner 3331 Route 9 Valatie, NY 12184 Tel: (518) 784-2250 Fax: (518) 784-2251 e-mail: [email protected] Part of an auditor s job is
1.1 Terms of Reference Y P N Comments/Areas for Improvement
1 Scope of Internal Audit 1.1 Terms of Reference Y P N Comments/Areas for Improvement 1.1.1 Do Terms of Reference: a) Establish the responsibilities and objectives of IA? b) Establish the organisational
Rolls Royce s Corporate Governance ADOPTED BY RESOLUTION OF THE BOARD OF ROLLS ROYCE HOLDINGS PLC ON 16 JANUARY 2015
Rolls Royce s Corporate Governance ADOPTED BY RESOLUTION OF THE BOARD OF ROLLS ROYCE HOLDINGS PLC ON 16 JANUARY 2015 Contents INTRODUCTION 2 THE BOARD 3 ROLE OF THE BOARD 5 TERMS OF REFERENCE OF THE NOMINATIONS
Audit and Performance Committee Report
Audit and Performance Committee Report Date: 3 February 2016 Classification: Title: Wards Affected: Financial Summary: Report of: Author: General Release Maintaining High Ethical Standards at the City
Antifraud program and controls assessment grid*
Advisory Services Antifraud program and * Fraud risks & controls February 2008 *connectedthinking 2008 PricewaterhouseCoopers LLP. All rights reserved. PricewaterhouseCoopers refers to PricewaterhouseCoopers
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements
ISA 240 February 2008 International Standard on Auditing The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements INTERNATIONAL STANDARD ON AUDITING 240 The Auditor s Responsibilities
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015. Torsten Wolf, CPP Head of Group Security Operations
Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, 2015 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic Crime Landscape Economic
Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner [email protected] 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS Paragraphs Introduction... 1-3 Characteristics of Fraud...
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT
COLLINS FOODS LIMITED (the COMPANY) CODE OF CONDUCT 1. Introduction The Company is committed to maintaining ethical standards in the conduct of its business activities. The Company's reputation as an ethical
INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS
INTERNATIONAL STANDARD ON 240 THE AUDITOR S RESPONSIBILITIES RELATING TO (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction
ACE elite fraudprotector
ACE elite fraudprotector Commercial Crime Insurance Policy ACE elite fraudprotector Insurance Policy (ed. AU 09/10) It wouldn t happen to us ACE elite fraudprotector Insurance Policy Fraud is a major threat
Consideration of Fraud in a Financial Statement Audit
Consideration of Fraud in a Financial Statement Audit 1719 AU Section 316 Consideration of Fraud in a Financial Statement Audit (Supersedes SAS No. 82.) Source: SAS No. 99; SAS No. 113. Effective for audits
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY
COUNCIL TAX REDUCTION, DISCOUNT & EXEMPTION ANTI- FRAUD POLICY December 2014 1 Contents Section Page Council Tax Reduction, Discount & Exemption Anti-Fraud Policy 1 Introduction 3 2 Definition of Council
National Australia Bank
Background In January 2004 the National Australia Bank (NAB) made the following three public announcements relating to losses from the foreign exchange options transactions: 13 January 2004 an initial
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
FRAUD RISK & INTERNAL AUDIT
FRAUD RISK & INTERNAL AUDIT ACFE & November 12, 2014 Mark P. Ruppert, CPA, CIA, CISA, CHFP, CHC, ACS, Director, Internal Audit Fraud Defined Fraud Risk Why Care / Why Assess Fraud Risk? What is Fraud Risk?
Fraud risk management. Report to Parliament 9 : 2012-13
Fraud risk management Report to Parliament 9 : 2012-13 Queensland Audit Office Location Level 14, 53 Albert Street, Brisbane Qld 4000 PO Box 15396, City East Qld 4002 Telephone (07) 3149 6000 Email Online
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS
IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS 1 Module 1: Principles of Risk and Risk Management Module aims The aim of this module is to provide an introduction to the principles and concepts of risk and
Get More Out of Your Risk Assessment. Austin Chapter of the IIA
Get More Out of Your Risk Assessment Austin Chapter of the IIA Speakers Alyssa G. Martin, CPA Dallas Executive Partner, Advisory Services 25 years of public accounting experience, with a practice emphasis
1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE
FRAUD RISK MANAGEMENT PROGRAM SHERYL VACCA SENIOR VICE PRESIDENT AND CHIEF COMPLIANCE AND AUDIT OFFICER MIKE JENSON UCR AUDIT DIRECTOR SESSION OBJECTIVE AND OUTLINE Assist campus managers in the development
Operational Risk Management - The Next Frontier The Risk Management Association (RMA)
Operational Risk Management - The Next Frontier The Risk Management Association (RMA) Operational risk is not new. In fact, it is the first risk that banks must manage, even before they make their first
EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT
EASY FOREX TRADING LTD DISCLOSURE AND MARKET DISCIPLINE IN ACCORDANCE WITH CAPITAL ADEQUACY AND THE REQUIREMENTS ON RISK MANAGEMENT 31 st December 2012 Introduction For the purposes of Directive DI144-2007-05
[Example] Social Media Acceptable Use Policy
[Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.
Aberdeen City Council IT Asset Management
Aberdeen City Council IT Asset Management Internal Audit Report 2014/2015 for Aberdeen City Council January 2015 Terms or reference agreed 4 weeks prior to fieldwork Target Dates per agreed Actual Dates
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
OMNI TECHNICAL SOLUTIONS. Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy
OMNI TECHNICAL SOLUTIONS Business Ethics, Compliance, Anti-Corruption and Anti-Money Laundering Policy Updated: September 2015 Table of Contents 1. Introduction... 2 2. Business Ethics... 3 2.1 Compliance...
Ethics, Fraud, and Internal Control
Ethics, Fraud, and Internal Control SUPRIYO BHATTACHARJEE AGM & MOF CAB,RBI,PUNE 17/9/07 Objectives Broad issues pertaining to business ethics Ethics in accounting information systems Ethical issues in
Policy-Standard heading. Fraud and Corruption Policy
Policy-Standard heading Fraud and Corruption Policy September 2013 Table of contents Introduction 3 Purpose 3 Scope 3 Related Policies and Processes 3 Definition of Fraud and Corruption 4 Policy 4 Code
Anti-bribery and Fraud Protection Policy
Anti-bribery and Fraud Protection Policy Dear Colleagues and Partners, Carbo One Limited is one of the largest coal trading companies in the market and the nature of its business requires interaction with
ICC Guidelines on Whistleblowing
ICC Guidelines on Whistleblowing Prepared by the ICC Commission on Anti-Corruption A. Introduction 1. No abatement of corruption and economic fraud Fraud remains one of the most problematic issues for
International Diploma in Risk Management Syllabus
International Diploma in Risk Management Syllabus Module 1: Principles of Risk and Risk Management The aim of this module is to provide an introduction to the principles and concepts of risk and risk management.
DRAFT. Anti-Bribery and Anti-Corruption Policy. Introduction. Scope. 1. Definitions
DRAFT Change History: Anti-Bribery and Anti-Corruption Policy Control Risks Group Ltd Commercial in confidence Introduction This document defines Control Risks policy on the avoidance of bribery and corruption.
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
GUIDANCE NOTE FOR DEPOSIT-TAKERS. Operational Risk Management. March 2012
GUIDANCE NOTE FOR DEPOSIT-TAKERS Operational Risk Management March 2012 Version 1.0 Contents Page No 1 Introduction 2 2 Overview 3 Operational risk - fundamental principles and governance 3 Fundamental
Practice guide. quality assurance and IMProVeMeNt PrograM
Practice guide quality assurance and IMProVeMeNt PrograM MarCh 2012 Table of Contents Executive Summary... 1 Introduction... 2 What is Quality?... 2 Quality in Internal Audit... 2 Conformance or Compliance?...
How To Understand The Role Of An Internal Audit
Top Ten Issues facing Internal Auditing in the Future The IIA Dallas Chapter April 6, 2006 Presented by: David A. Richards, CIA, CPA President The Institute of Internal Auditors [email protected] 1
15 December 2015. Crime Prevention and Anti-Fraud Policy
15 December 2015 Crime Prevention and Anti-Fraud Policy Content 1. Purpose 3 2. Scope 3 3. Action Principles 3 4. Control, Evaluation, and Revision 4 Look after the Environment. Print in black and white,
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
The auditors responsibility to consider fraud in an audit of financial statements
The auditors responsibility to consider fraud in an audit of financial statements Audit in a nutshell Reality Picture (= financial statements) Balance sheet Assets Liabilities Equity Process Detection
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Disciplinary and Dismissals Policy
Policy Purpose/statement/reason for being Disciplinary and Dismissals Policy E.G - MIP is designed to strengthen the effectiveness of individual s contribution to the Council s success. Purpose The Disciplinary
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
CORRUPTION. A Reference Guide and Information Note. to support the fight against Corruption. Safeguarding public sector integrity
FINANCIAL ACTION TASK FORCE CORRUPTION A Reference Guide and Information Note on the use of the FATF Recommendations to support the fight against Corruption The Financial Action Task Force (FATF) is the
7/22/2014. From Treadway To the Cube (1987 2014) So, Who is COSO? What Does COSO Do?
From Treadway To the Cube (1987 2014) National Society of Accountants for Cooperatives (NSAC) CLAconnect.com Instructor: Ron Durkin, CPA/CFF, CFE, CIRA National Principal in Charge Fraud & Misconduct Investigations
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA
Forensic Auditing: The Audit of the Future, Today Instructor: Ron Durkin, CFE, CPA/CFF, CIRA 1 1 Agenda Current events and developments in forensic accounting Define the term forensic auditing What is
