Leveraging Big Data to Mitigate Health Care Fraud Risk
|
|
|
- Valentine Kennedy
- 10 years ago
- Views:
Transcription
1 Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services
2 Introduction Health Care Is Victimized by Fraud Fraud by Industry Fraud Schemes in Health Care Industry of victim organizations in the 2014 Report to the Nations: 1. Banking 2. Government 3. Manufacturing 4. Health Care 5. Education The most common fraud schemes perpetrated in the health care industry in the 2014 Report to the Nations were: 1. Corruption 2. Billing 3. Expense reimbursements 4. Skimming 5. Payroll 6. Cash on Hand Source: 2014 ACFE Report to the Nations 2
3 Anti-Fraud Controls in Health Care Frequency & Effectiveness Frequency of Anti-Fraud Controls Effectiveness of Anti-Fraud Controls The 2014 Report to the Nations included questions regarding the presence of 18 possible anti-fraud controls in victim organizations. Some of the controls include external audits of financial statements, internal audit departments, hotlines & others. Proactive data monitoring/analysis ranked 14th most common, with 34.8 percent of victim organizations having this control in place. To determine effectiveness, the study analyzed the impact of the anti-fraud controls on median loss & duration. Organizations not using proactive data monitoring/analysis saw a median loss of $181,000, while those with the control in place saw a median loss of $73,000. The overall reduction in median loss was 59.7 percent, higher than any other control. With regard to duration, organizations that did not have proactive data monitoring/analysis saw a median duration of 24 months, while those with the control saw a median duration of 12 months. The overall reduction was 50 percent, matching five other controls for the most effective. Source: 2014 ACFE Report to the Nations 3
4 proactive data monitoring and analysis appears to be the most effective at limiting the duration and cost of fraud schemes Source: 2014 ACFE Report to the Nations
5 Purchasing Cards Leveraging bank data to identify fraud, waste & abuse.
6 Background How Fraud Is Committed In addition to fraud, purchasing cards are an area where waste & abuse are common. In many cases it is possible to analyze purchasing card activity to identify potential areas for cost savings, e.g., through the use of purchasing accounts at high volume vendors. Common purchasing card fraud schemes include: Using a corporate credit card for personal purchases Using reward card points for personal benefit Paying corporate expenses with the card when expense reimbursements has also been requested section 01 6
7 Insights Procedures to Consider While purchasing cards are considered by many to be high risk, the data available for analysis is some of the best. Also, many organizations have strictly developed policies regarding the use of purchasing cards. Detecting fraud, improper use, waste & abuse begins with procedures designed to identify violations of organizational policy. Other common procedures include: Identify transactions outside normal business hours Identify transactions on a holiday, including Black Friday & online Cyber Monday purchases Analysis of transactions with high-risk merchants Identify use of a purchasing card while on vacation or leave Identify transactions indicative of gift card purchases Analysis of Level III detail for unusual purchased items To take your purchasing card analysis to the next level, download leave data from payroll & compare vacation dates to transaction dates to identify employees using their cards on vacation. section 01 7
8 Accounts Payable Using vendor & transaction based data to address misappropriation & corruption.
9 Background How Fraud Is Committed Many of the most common fraud schemes in accounts payable start with manipulation of the vendor file. For this reason, control over vendor setup & changes to the vendor master file is an important control. Other attributes of schemes in accounts payable relate to payment information. Common schemes include: Fictitious vendors Conflicts of interest and/or unknown related parties Payments issued outside normal business hours Theft &/or manipulation of payments Invoices for fictitious goods or services Patient refund manipulation section 02 9
10 Insights Procedures to Consider Vendor Specific Procedures Many investigations in accounts payable begin with an analysis of the vendor master file. This file is important, because it contains the attributes about a vendor used to verify existence. Common procedures include: Employee/vendor matching Geographic proximity analysis Identifying vendors with a mailbox service or PO box address Analysis of vendor attribute capture Assessment of dormant and/or inactive vendors Identification of potential duplicate vendors Transaction Specific Procedures In addition to analysis of vendor attributes, the transactions used to issue payments to vendors are also important. These transactions contain key information regarding trends & patterns of activity. Some of the more common procedures used include: Benford s Law analysis Trend analysis of vendor activity Analysis of payment issuance patterns Identification of potential duplicate invoices Assess of payment sequences for anomalies section 02 10
11 Payroll Analyzing data to identify potential fraud & gain operational insights on personnel utilization.
12 Background How Fraud Is Committed Payroll schemes can take many different forms. Manipulation of the employee master file, deductions/withdrawal records, pay rates, time clock information or other hours based information are all ways in which payroll schemes can be perpetrated. Common payroll schemes include: Ghost employees Falsification of hours Tax fraud Earnings manipulation Time-clock manipulation section 03 12
13 Insights Procedures to Consider Employee Master File Procedures The first line of defense against payroll fraud schemes is control over the employee master file. Procedures designed to identify potential ghost employees include: Identification of potential duplicate employees Analysis of shared employee attributes, e.g., bank accounts, addresses, etc. Identification of employees with mailbox service addresses Analysis of employees without voluntary deductions or tax withholdings on file Payroll Detail File Procedures To identify falsification of hours, earnings manipulation & pay rate manipulation schemes, it is key to analyze payroll transactions. These transactions can also be used to identify potential ghost employees. Procedures include: Trend analysis of pay rates over time to identify unusual fluctuations Analysis of excessive hours by type Identification of payroll transactions issued off-cycle Analysis of hours compared to organizational policies section 03 13
14 Refunds of Overpayments Leveraging patient accounting data to address compliance with everchanging & complex regulations.
15 Background Key Regulations for Refunds Liability under the False Claims Act ( FCA ) 1 Section 3729(a)(1)(G) of the statute defines a reverse false claim. Essentially, this section provides liability where one acts improperly to avoid having to pay money to the government. Liability under the Fraud Enforcement Recovery Act of 2009 ( FERA ) FERA expanded the liability provided by FCA by eliminating the requirement of using a false statement or record to avoid payment to the government. Impact of Patient Protection and Affordable Care Act of 2010 ( PPACA ) 3 Combined with the application of FCA & FERA provisions, PPACA results in a requirement that health care organizations return overpayments to the government within 60 days of overpayment identification. The challenge in this regulation is the lack of definition for the term identified. While a definition has not been provided by statute or the courts, organizations need to be aware of this requirement & diligent in their return of overpayments section 04 3 Journal of Health Care Compliance, Volume 13, Number 4, July-August 2011, pages 39-41, Stark Provisions, McClain E. Bryant 15
16 Insights Procedures to Consider Data Elements to Obtain In analyzing activity for compliance with refund requirements stipulated by FCA, FERA & PPACA, health care organizations should incorporate all relevant data elements. These include: Patient visit information, including applicable payer information Account charge level detail, including date of service & charge post dates Account adjustment detail, including post date & related payer information Account payment detail, including date of payment, post date & resulting account balance Patient account billing & collection notes Utilizing all available data fields will provide the most comprehensive picture of the account activity & timing. Analysis to Perform Using the available data sets, organizations have the ability to analyze accounts where refunds were issued & those where refunds may need to be issued. Both account types are important for compliance with all applicable regulations. Some of the key time metrics include: Number of days from initial credit balance to refund Number of days from refund due note posting to refund Number of days an account has had a credit balance Number of days from payment date to payment posting date Number of days since last payment on account Using these metrics, organizations will be in a better position to assess compliance with regulations governing overpayments. section 04 16
17 Exclusion Testing Using both internal & external data sources to learn more about those with which your organization is doing business.
18 Background How Violations Occur Organizations receiving federal funds are subject to restrictions regarding the individual & entities with which they do business. Depending on the type of federal funding, the type of exclusion & applicable excluding entity may differ. Three federal lists containing individuals & entities excluded from federal funds include: List of Excluded Individuals & Entities (LEIE) Excluded Parties List System (EPLS) Specifically Designated Nationals list (SDN) In addition to the federal lists, many state funded programs have exclusion lists for their specific programs. Check the website of any government funding sources for potential requirements to comply with these restrictions. section 05 18
19 Insights Procedures to Assess Compliance At the federal level, there are three main sources of information related to excluded entities & individuals. These are: Office of Inspector General - LEIE ( System for Award Management - EPLS ( U.S. Department of the Treasury - SDN ( List/Pages/default.aspx) Each of these sources of exclusion information contain two options: 1. Searchable lists 2. Downloadable lists Using the downloadable list option, organizations have the ability to compare their employees, vendors, providers & other entities/individuals with which they do business to the list of exclusions. This comparison should use available attributes such as name, address, national provider identifier & others. If a match is found, review the appropriate website to determine next steps. section 05 19
20 Resources Documents, websites & links to provide you with what you need to start getting the most out of your data.
21 Information Resources to Consider IIA Global Technology Audit Guides Continuous Auditing Fraud Prevention and Detection in an Automated World Data Analysis Company Sites ISACA White Paper Data Analytics A Practical Approach Health Care Specific section 06 21
22 Speaker Bio Jeremy Clopton, CPA, CFE, ACDA Jeremy is a senior managing consultant in BKD s Forensics & Valuation Services division and specializes in providing fraud investigation and forensic data mining services. Jeremy has experience in using ACL, IDEA and Tableau software for forensic data mining and continuous auditing. His forensic data mining experiences include all major industries in both investigation and prevention projects, and has designed and implemented continuous auditing solutions for organizations in a variety of industries, including Fortune 500 companies and health care institutions. He was a speaker at the 2013 ACL Connections Global User Conference and currently contributes to Fraud Magazine s Fraud EDge column on the intersection of data analytics and digital forensics. Contact Information Phone: [email protected] Social Media Blog: LinkedIn: section 06 22
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
Perp Poetry. Fraud & Embezzlement: Lessons From the Trenches. Presented by. acumen insight. ideas attention reach. expertise depth agility talent
acumen insight Fraud & Embezzlement: Lessons From the Trenches ideas attention reach Presented by Angela Morelock, CPA, CFE, CFF, ABV, Certified Forensic Accountant www.bkdforensics.com expertise depth
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE
FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE CPAs & ADVISORS experience reach // S. Todd Burchett, CPA, ABV, ASA, CFF, CFE Partner [email protected] 210.268.1932 AGENDA
Deloitte Forensic Fraud Risk Management
Deloitte Forensic Fraud Risk Management Introduction Organizations cannot afford to be unconcerned about the risk of fraud. Directors and management have a fiduciary obligation and a corporate responsibility
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner
Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner Learning Objectives: Understand how fraud can occur Learn procedures you can implement to prevent fraud Learn how to detect fraud Common Situations
Diploma in Forensic Accounting (Level 4) Course Structure & Contents
Brentwood Open Learning College Diploma in Forensic Accounting (Level 4) Course Structure & Contents Diploma in Forensic Accounting Course Structure & Contents Page 1 Unit 1 Introduction Forensic Accounting
Procurement Fraud Identification & Role of Data Mining
The paper describes the known boundaries of Procurement Fraud and outlines the scope of data mining within the same. The paper also highlights some of the basic steps to be taken care of before the application
Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer
Internal Controls for Small Organizations Jen Parker, CPA Director of Accounting & Finance US Youth Soccer Fraud Statistics: The following statistics about fraud and white collar crime are from the Association
Office of the Inspector General
Office of the Inspector General Commonwealth of Massachusetts Gregory W. Sullivan Inspector General Guide to Developing and Implementing Fraud Prevention Programs April 2005 Dear Public Officials: April
Sharon Kurek, CPA, CFE Director of Internal Audit
Sharon Kurek, CPA, CFE Director of Internal Audit What You Will Take Aware With You Definition of Internal Auditing Scope of Audit Activities Risk and Control Process Common Audit Topics Fraud Awareness
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST
ACCOUNTS PAYABLE AUDIT RECOVERING LOST DOLLARS AT NO COST 1 Our Objective To assist organizations in finding lost thousands of dollars in profits through duplicate payments, duplicate billings, overpayments,
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA
KEYS TO AN EFFECTIVE ANTI-FRAUD PROGRAM WAYNE PURVES DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA AHIA 32 nd Annual Conference August 25-28, 2013 Chicago, Illinois
Fraud Awareness Training
UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete Objectives What is occupational fraud Common myths about fraud Conditions for
5 Important Controls to Mitigate Employee Fraud
5 Important Controls to Mitigate Employee Fraud LMCIT WEBINAR : FEBRUARY 10, 2015 IN PARTNERSHIP WITH EIDE BAILLY Presenter: Jason Olson, MBA, CPA/CFF, CFE, CFI Presentation Disclaimer These seminar materials
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses
Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants Forensic Accounting, Political Corruption & White Collar Offenses Defining Fraud The dictionary defines fraud as a deception
False Claims / Federal Deficit Reduction Act Notice Help Stop Healthcare Fraud, Waste and Abuse: Report to the Firelands Corporate Compliance Officer
1111 Hayes Avenue Sandusky, OH 44870 www.firelands.com False Claims / Federal Deficit Reduction Act Notice Help Stop Healthcare Fraud, Waste and Abuse: Report to the Firelands Corporate Compliance Officer
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down
Types of and Recent Cases Developing an Effective Anti-fraud Program from the Top Down 1 Types of and Recent Cases Chris Grippa (404-817-5945) FIDS Senior Manager with Ernst & Young LLP Works with clients
Fraud Prevention: The Prevention and Detection of Fraud Begins with You
Fraud Prevention: The Prevention and Detection of Fraud Begins with You Takeaways What is fraud? Definition Facts Four factors Fraud risk assessment Four evaluation criteria Common fraud schemes Case studies
Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver
Data Mining: Unlocking the Intelligence in Your Data Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver 0 Today s Agenda Big Data What is it? Data Mining at a Glance Why the Accounting
Employee Embezzlement and Fraud. Defending Against Insider Threats
Employee Embezzlement and Fraud Defending Against Insider Threats Today s Approach An open dialogue and sharing of information regarding a common threat of internal losses. There is no guarantee that any
Medicare Advantage and Part D Fraud, Waste, and Abuse Training. October 2010
Medicare Advantage and Part D Fraud, Waste, and Abuse Training October 2010 Introduction 2008: United States spent $2.3 trillion on health care. Federal fiscal year 2010: Medicare expected to cover an
USC Office of Compliance
PURPOSE This policy complies with requirements under the Deficit Reduction Act of 2005 and other federal and state fraud and abuse laws. It provides guidance on activities that could result in incidents
Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you
3/27/2012 Proactive Fraud Detection with Data Mining Fear not the computer You play ball with it and it will play ball with you Executive Summary The time to test fraud controls is before you have a fraud
Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A
Brochure More information from http://www.researchandmarkets.com/reports/2866056/ Fraud and Fraud Detection. A Data Analytics Approach + Website. Wiley Corporate F&A Description: Detect fraud faster no
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2014 Global Fraud Study Letter from the President & CEO In 1988, Dr. Joseph T. Wells founded the ACFE with a stated mission to reduce the incidence
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
Forensic Audit Building a World Class Program
Forensic Audit Building a World Class Program PAUL E. ZIKMUND DIRECTOR GLOBAL INTEGRITY AND FORENSIC AUDIT 1 2012 ACFE ANNUAL FRAUD CONFERENCE ORLANDO, FL Why the Need for Forensic Audit Program In response
Fraud Prevention and Detection in a Manufacturing Environment
Fraud Prevention and Detection in a Manufacturing Environment Introduction The Association of Certified Fraud Examiners (ACFE) estimated in its 2008 Report to the Nation on Occupational Fraud and Abuse
Fraud Prevention Checklist for Small Businesses
Fraud Prevention Checklist for Small Businesses 11 Ways to Minimize the Risk and Impact PAYMENT SOLUTIONS Fraud can have a devastating impact on small businesses. Prevention and mitigation strategies can
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY Letter from the President & CEO More than 15 years ago, the ACFE s founder and Chairman, Dr. Joseph T. Wells, CFE, CPA, conceptualized
Fraud Triangle Analytics Anti-Fraud Research and Methodologies
Fraud Triangle Analytics Anti-Fraud Research and Methodologies Risk Management Committee Meeting American Hotel & Lodging Association November 18, 2009 Topics for discussion Why incorporate fraud detection
FRAUD RISK ASSESSMENT
FRAUD RISK ASSESSMENT All agencies are subject to fraud risks and need to complete a fraud risk assessment for their agency at least every biennium. A detailed fraud assessment needs to be performed by
Financial Transactions and Fraud Schemes
Financial Transactions and Fraud Schemes Asset Misappropriation: Fraudulent Disbursements Fraudulent Disbursement Schemes Register disbursement schemes Check tampering schemes Payroll schemes Billing schemes
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
Centre for Corporate Governance. Sample listing of fraud schemes
Centre for Corporate Governance Sample listing of fraud schemes Sample listing of fraud schemes The following listing of possible fraud schemes can be utilized by management and auditors to assist in identifying
Steven Boyer Vice-President, Gallagher Bassett Services Inc.
Employee Dishonesty and Fraud Motive, Rationale & Opportunity Steven Boyer Vice-President, Gallagher Bassett Services Inc. Randall Wilson, CPA/CFF, CFE, Cr.FA Partner, National Practice Director Fraud
Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.
Making Your Fraud Vision 20 / 20 Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner [email protected] 610-603-5603 Topics to be Covered + Summary of Fraud Statistics ACFE 2014 Report + Current
ISOLATE AND ELIMINATE FRAUD THROUGH ADVANCED ANALYTICS. BENJAMIN CHIANG, CFE, CISA, CA Partner, Ernst and Young Advisory Singapore
With ever-increasing data volumes, more sophisticated fraud patterns, and a drive for strong corporate governance, how can organisations build a culture of integrity and compliance? Learn how data analytics
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption
Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption Toby Bishop, Director, Deloitte Forensic Center Deloitte Financial Advisory Services LLP Contents Why corporate resiliency? What
Developing and Implementing a Fraud Risk Assessment. Josh Shilts CPA/CFF, CFE
Developing and Implementing a Fraud Risk Assessment Josh Shilts CPA/CFF, CFE MY GOAL HAVE YOU WALK AWAY WITH THE KNOWLEDGE AND TOOLS TO COMPLETE A FORMAL & USEFUL FRAUD RISK ASSESSMENT!!! Before We Begin,
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
Leveraging Your ERP System to Enhance Internal Controls
July 2015 Leveraging Your ERP System to Enhance Internal Controls Public Sector Entities By Melinda J. DeCorte, CPA, CFE, CGFM, and Jeanne M. Owings, Principal Audit Tax Advisory Risk Performance Even
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM
FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM Presenter: Zamani Nxumalo SAS, National Treasury 30 March 2011 CONTENTS Key Terms & Definitions Process & Challenges Fraud
Introducing SAP Fraud Management. Jérôme Pugnet
Introducing SAP Fraud Management Jérôme Pugnet LEARNING POINTS Impacts and Challenges of Fraud How Big is the Problem? Fraud is Typically Found Without Technology: an Undetected Potential! What are the
COMPLIANCE POLICY MANUAL
COMPLIANCE POLICY MANUAL FOREIGN CORRUPT PRACTICES ACT 07/24/2012 Policy Number 16-100 SUBJECT: FOREIGN CORRUPT PRACTICES ACT Application: Worldwide Strategic Business Units and Subsidiaries. It is the
Understanding Health Reform s
Compliance 101: Understanding Health Reform s New Compliance Requirements Uri Bilek Feldesman Tucker Leifer Fidell LLP Does your organization have a designated Compliance Officer? a. Yes b. No c. Don't
Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009
Forensic Audit and Automated Oversight Federal Audit Executive Council September 24, 2009 Dr. Brett Baker, CPA, CISA Assistant Inspector General for Audit U.S. Department of Commerce OIG Overview Forensic
Fraud, Waste and Abuse: Compliance Program. Section 4: National Provider Network Handbook
Fraud, Waste and Abuse: Compliance Program Section 4: National Provider Network Handbook December 2015 2 Our Philosophy Magellan takes provider fraud, waste and abuse We engage in considerable efforts
1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE
FRAUD RISK MANAGEMENT PROGRAM SHERYL VACCA SENIOR VICE PRESIDENT AND CHIEF COMPLIANCE AND AUDIT OFFICER MIKE JENSON UCR AUDIT DIRECTOR SESSION OBJECTIVE AND OUTLINE Assist campus managers in the development
Fraud Awareness and Prevention Program Report
Internal Audit Department Fraud Awareness and Prevention Program Report Project 2009-263 A Review of Fraud Awareness, Prevention, Detection and Risk Mitigation Practices in Landfill Operations, Central
Financial Services Group
Fraud Detection and Prevention Presented by: Carrie Kennedy, CPA, Partner Anthony Porter, CPA, Manager 1 The material appearing in this presentation is for informational purposes only and should not be
LGMA Qld Governance and Corporate Planning Village Forum
www.pwc.com.au Fraud Risk Management Fraud Risk Assessments LGMA Qld Governance and Corporate Planning Village Forum March 2015 Agenda Introductions Fraud Risk Management Fraud Statistics s Global Economic
PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists
PREVENTING FRAUD, ABUSE, & WASTE: A Primer for Physical Therapists Available at: http://www.apta.org/integrity 2014 American Physical Therapy Association. All rights reserved. All reproduction or redistribution
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE
REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2010 Global Fraud Study Letter from the President When the ACFE published its first Report to the Nation on Occupational Fraud and Abuse in 1996, it
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY
SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY NOTE: This appendix is a sample from another entity. As such, no adjustment has been made to this material. The information may or may not agree with all the
Payments Fraud Best Practices
Stephen W. Markwell Disbursements Product Executive J.P. Morgan Pamela R. Malmos Director Finance, Treasury Operations ConAgra Foods, Inc. Fraud Prevention Laura Howley, CTP Director, Global Treasury Operations
Contents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 [email protected]
A Roadmap for New Physicians. Avoiding Medicare and Medicaid Fraud and Abuse
A Roadmap for New Physicians Avoiding Medicare and Medicaid Fraud and Abuse Introduction This tutorial is intended to assist new physicians in understanding how to comply with Federal laws that combat
716 West Ave Austin, TX 78701-2727 USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the
To: All Vendors, Agents and Contractors of Hutchinson Regional Medical Center
To: All Vendors, Agents and Contractors of Hutchinson Regional Medical Center From: Corporate Compliance Department Re: Deficit Reduction Act of 2005 Dear Vendor/Agent/Contractor: Under the Deficit Reduction
Fraud Detection & Data Analytics
September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics
Fighting Fraud with Data Mining & Analysis
Fighting Fraud with Data Mining & Analysis Leonard W. Vona December 2008 Fraud Auditing, Inc. Phone: 518-784-2250 www.fraudauditing.net E-mail: [email protected] Copyright 2008 Leonard Vona and Fraud
Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
C O N F I D E N T I A L A N D P R O P R I E T A R Y. Page 1 of 7 Title: FRAUD, WASTE, AND ABUSE POLICY
Page 1 of 7 1. Purpose As a Company that does business with U.S. state and federal government health care programs (such as Medicare and Medicaid), Hill-Rom is required to maintain a system of policies
Integrating Data Analytics into Internal Audit
Integrating Data Analytics into Internal Audit IIA Beach Cities Meeting May 19, 2011 Agenda Introductions Background Industry Perspective Benefits of Challenges in Examples / Case Studies Tools Of The
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments
GOVERNANCE: Enhanced Controls Needed To Avoid Duplicate Payments Audit Report OIG-A-2013-018 September 20, 2013 NATIONAL RAILROAD PASSENGER CORPORATION Office of Inspector General REPORT HIGHLIGHTS Why
ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada
Once an employee commits fraud, he has limited time to conceal the financial transaction in the accounting records. Learn how employees hide these fraudulent transactions and what to look for when reviewing
How To Handle A Fraud At Psc
FRAUD POLICY Purpose and Background PSC is committed to the highest standards of moral and ethical behavior. The purpose of PSC s Fraud Policy is to foster an environment that promotes awareness to fraudulent
ANTI-FRAUD POLICY Adopted August 13, 2015
ANTI-FRAUD POLICY Adopted August 13, 2015 Introduction The Board of Commissioners of the Housing Authority of the City of Muskogee (MHA) has established an anti-fraud policy to enforce controls and to
Continuous Auditing and Monitoring Leveraging Your Data for Compliance
Continuous Auditing and Monitoring Leveraging Your Data for Compliance A Phyllis Patrick & Associates LLC White Paper April 2014 Gail Hormats, B.S., M.B.A., C.I.A., C.I.S.A., C.R.M.A., C.A.D.A. Automated
UPDATED. Special Advisory Bulletin on the Effect of Exclusion from Participation in Federal Health Care Programs
UPDATED Special Advisory Bulletin on the Effect of Exclusion from Participation in Federal Health Care Programs Issued May 8, 2013 Updated Special Advisory Bulletin on the Effect of Exclusion from Participation
GENERAL PAYROLL CONTROLS Dates in scope:
GENERAL PAYROLL CONTROLS Risk # Risk Expected Control Step # Testing Documents/Info Needed 1 Unauthorized initial pay rate 2 Unauthorized/unsupported deductions (statutory deductions and benefits). Initial
The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations
The Fraud Enforcement and Recovery Act and Healthcare Reform: Implications for Compliance Initiatives and Fraud Investigations Presented by: Robert Threlkeld, Esq. Holly Pierson, Esq. Paul F. Danello,
Fraud, Waste & Abuse. UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department
Fraud, Waste & Abuse UPMC Health Plan Quality Audit, Fraud, Waste & Abuse Department Definitions of Fraud, Waste & Abuse FRAUD: An intentional deception or misrepresentation made by a person or entity,
