Fraud Workshop Finding the truth in the transactions
|
|
|
- August Moore
- 10 years ago
- Views:
Transcription
1 Your Trusted Partner for Audit Analytics Fraud Workshop Finding the truth in the transactions Copyright 2011 ACL Services Ltd. Robin Clough, ACDA ACL Certified Trainer
2 Copyright 2011 ACL Services Ltd. 2 Your Trusted Partner for Audit Analytics Presenter Agenda ACL and fraud detection Creating a fraud detection program Features in ACL that can assist with fraud detection Sample analytics / Analytics in AX Questions
3 Copyright 2011 ACL Services Ltd. 3 ACL and fraud detection
4 Copyright 2011 ACL Services Ltd. 4 ACL and fraud detection Trawl large volumes of data Evidence could be hidden behind millions of transactions Don t rely on lottery approach, focus on 100% of the transactions Use ACL profiling commands to find trends/outliers Use ACL filtering to home in on unusual transactions
5 Copyright 2011 ACL Services Ltd. 5 ACL and fraud detection Span more than one dataset Bring several sets of data into the analysis from different systems Use ACL combining commands to cross compare data
6 Copyright 2011 ACL Services Ltd. 6 ACL and fraud detection Use a continuous approach Look at implementing AX Fraud occurs on an ongoing basis Run analytics on a regular basis Ensure results are reviewed Exception Ensure analytics are kept fresh and current
7 Copyright 2011 ACL Services Ltd. 7 Creating a fraud detection program
8 Copyright 2011 ACL Services Ltd. 8 Creating a fraud detection program Build a profile of potential frauds Identify high risk areas Look at historical fraud Inside/outside organisation What s happening elsewhere media, industry groups
9 Copyright 2011 ACL Services Ltd. 9 Creating a fraud detection program Develop analytics to look for possible indicators of fraud Use full breath of ACL features Convert to scripts Refine and repeat over time
10 Copyright 2011 ACL Services Ltd. 10 Creating a fraud detection program Improve controls by implementing continuous controls monitoring Don t wait too long to detect the fraud it could be too late Best caught in early stage before real damage is done
11 Copyright 2011 ACL Services Ltd. 11 Features in ACL that can assist with Fraud Detection
12 Copyright 2011 ACL Services Ltd. 12 Features in ACL that can assist with Fraud Detection STATISTICS Command Gives averages, value or date spans Lots of values stored as variables that could be used in filters and scripts
13 Copyright 2011 ACL Services Ltd. 13 Features in ACL that can assist with Fraud Detection DUPLICATES Command Easy to use, key is in selection of data and computed fields Common application is in analysis of duplicate payments Suppliers may be deliberately double invoicing to exploit control weaknesses Could also be collusion between AP and Suppliers
14 Copyright 2011 ACL Services Ltd. 14 Features in ACL that can assist with Fraud Detection CLASSIFY / SUMMARIZE Commands Great for spanning large datasets and seeing the data in a concise way Take vendor creation/modification Is the role of K_DUDAK really to create/modify vendors? Why blanks? Use in combination with AVERAGE1 variable generated by STATISTICS Set tolerance boundaries e.g. 20% below AVERAGE1 Sometimes good to view graphically also
15 Copyright 2011 ACL Services Ltd. 15 Features in ACL that can assist with Fraud Detection STRATIFY Command Good way to quickly see outliers in a large population of numbers Could be used when viewing expenses
16 Copyright 2011 ACL Services Ltd. 16 Features in ACL that can assist with Fraud Detection FIND Function Easy to locate key strings of data in large data sets Is not case sensitive and also looks within strings Famous Gym/Taxi scam
17 Copyright 2011 ACL Services Ltd. 17 Features in ACL that can assist with Fraud Detection BENFORD Command Probability theorem that makes predictions about distribution of digits in numerical data Can detect hidden trends occurring in the data Looks at first few digits of numbers and attempts to predict expected distribution Used frequently to detect spending just below authorisation levels Always worth running to see what it comes up with anything
18 Copyright 2011 ACL Services Ltd. 18 Features in ACL that can assist with Fraud Detection BENFORD Command
19 Copyright 2011 ACL Services Ltd. 19 Features in ACL that can assist with Fraud Detection FILTERS Allows you to home in on transactions that meet certain conditions Quick filter allows expressions to be built quickly with no syntax errors Use variables and functions to make your filters powerful Any guesses as to what this filter is doing?
20 Copyright 2011 ACL Services Ltd. 20 Features in ACL that can assist with Fraud Detection COMPUTED FIELDS / WORKSPACES Add your own fields to existing data fields Confirm accuracy of calculations Store filters as logical computed fields i.e. T or F For widely used computed fields think about using Workspaces
21 Copyright 2011 ACL Services Ltd. 21 Features in ACL that can assist with Fraud Detection SCRIPTS Why reinvent the wheel every time? Share/swap your scripts with your friends! Easier than you think to create recorder, log entries, create script from table history What s this script doing?
22 Copyright 2011 ACL Services Ltd. 22 Sample Analytics
23 Copyright 2011 ACL Services Ltd. 23 Sample Analytics Purchase to Pay Split purchases Inflated prices (collusion) Duplicate payments Appropriate authorisation Invoice amount doesn t match PO amount
24 Copyright 2011 ACL Services Ltd. 24 Sample Analytics Purchase to Pay Cross check between employees/contractors and suppliers Check key information is not fictitious e.g. address details, VAT number Segregation of duty analysis roles matrix Vendor creation and modification
25 Copyright 2011 ACL Services Ltd. 25 Sample Analytics Purchase cards Merchant profiling Personal use e.g. holiday travel instead of business travel! Weekend use, outside business hours Split purchases (Benford) Peer group comparison Restricted merchants
26 Copyright 2011 ACL Services Ltd. 26 Sample Analytics Travel and entertainment expenses Duplicate claims No receipts Inappropriate use Wrong rates Policy breach e.g. business travel v economy travel, meal allowance exceeded Peer group comparison Authorisation checks Benford
27 Copyright 2011 ACL Services Ltd. 27 Sample Analytics Journals Raised during non working days or hours Isolate manual journals Created by senior management Large amounts / Small amounts Round sum amounts Benford analysis
28 Copyright 2011 ACL Services Ltd. 28 Sample Analytics Others Timesheet/Swipe card analysis Point of Sale analysis Stock levels/wastage levels
29 Copyright 2011 ACL Services Ltd. 29 Analytics in AX
30 Copyright 2011 ACL Services Ltd. 30 Questions?
ACL EBOOK. Detecting and Preventing Fraud with Data Analytics
ACL EBOOK Detecting and Preventing Fraud with Data Analytics Contents Why use data analysis for fraud?... 4 Internal control systems, while good, are not good enough... 5 Purpose-built data analytics is
Using Technology to Automate Fraud Detection Within Key Business Process Areas
Using Technology to Automate Fraud Detection Within Key Business Process Areas 2013 ACFE Canadian Fraud Conference September 10, 2013 John Verver, CA, CISA, CMA Vice President, Strategy ACL Services Ltd
AGA Kansas City Chapter Data Analytics & Continuous Monitoring
AGA Kansas City Chapter Data Analytics & Continuous Monitoring Agenda Market Overview & Drivers for Change Key challenges that organizations face Data Analytics What is data analytics and how can it help
Data Analytics For the Restaurant Industry
Data Analytics For the Restaurant Industry 2014 Sunera Snapshot SAP ACL Copyright 2013 Sunera LLC. 2 About Our Speaker Matt Osbeck, CPA, CIA, ACDA Matt is a Senior Manager in the Los Angeles office of
Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution
Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution December 10, 2014 Parm Lalli, CISA, ACDA Sunera Snapshot Professional consultancy with core competency in:
by: Scott Baranowski, CIA
Community Bank Auditors Group A/P, Procurement and Credit Card Internal Controls June 4, 2014 by: Scott Baranowski, CIA MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf
Invoice Number Vendor Number Amount 129304 A543891 $1,035.71 129304 A543891 $1,035.71
Fraud Detection: Using Data Analysis Techniques A new approach being used for fraud prevention and detection involves the examination of patterns in the actual data. The rationale is that unexpected patterns
An Auditor s Guide to Data Analytics
An Auditor s Guide to Data Analytics Natasha DeKroon, Duke University Health System Brian Karp Services Experis, Risk Advisory May 11, 2013 1 Today s Agenda Data Analytics the Basics Tools of the Trade
Using T Accounts to post journal entries
Using T Accounts to post journal entries Debits Credits This is a T account which is used to analyze posting of double entry accounting Both the right hand column T and the left must have equal totals.
Completing an Accounts Payable Audit With ACL (Aired on Feb 15)
AuditSoftwareVideos.com Video Training Titles (ACL Software Sessions Only) Contents Completing an Accounts Payable Audit With ACL (Aired on Feb 15)... 1 Statistical Analysis in ACL The Analyze Menu (Aired
ACL Command Reference
ACL Command Reference Test or Operation Explanation Command(s) Key fields*/records Output Basic Completeness Uniqueness Frequency & Materiality Distribution Multi-File Combinations, Comparisons, and Associations
ACL WHITEPAPER. Automating Fraud Detection: The Essential Guide. John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances
ACL WHITEPAPER Automating Fraud Detection: The Essential Guide John Verver, CA, CISA, CMC, Vice President, Product Strategy & Alliances Contents EXECUTIVE SUMMARY..................................................................3
Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution
Data Analytics: Applying Data Analytics to a Continuous Controls Auditing / Monitoring Solution January 22, 2015 Michael Kano, ACDA Sunera Snapshot Professional consultancy with core competency in: Internal
Advanced Data Analytics, the Fraudsters Worst Enemy
Advanced Data Analytics, the Fraudsters Worst Enemy Introducing Powerful Tools and Techniques to Uncover Fraud Agenda Overview of data analytics in the anti-fraud and fraud investigation context Capability
Comparison of Generalized Audit Software
Comparison of Generalized Audit Software In today s modern and computerized world even small companies have huge numbers of financial transactions going through the books. As an (external) auditor, it
Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver
Data Mining: Unlocking the Intelligence in Your Data Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver 0 Today s Agenda Big Data What is it? Data Mining at a Glance Why the Accounting
Accounts Payable Fraud Services
Accounts Payable Fraud Services According to research conducted by the Association of Certified Fraud Examiners (ACFE), U.S. organizations lose an estimated 7 percent of annual revenues to fraud. 1 In
Final. Internal Audit Report. Creditors System
Final Internal Audit Report Creditors System Document Details: Reference: 1.2 / 2014-15 Senior Manager, Internal Audit & Assurance: David Jenkins ext 6567 Date: 7 th January 2015 This report is not for
Why is Internal Audit so Hard?
Why is Internal Audit so Hard? 2 2014 Why is Internal Audit so Hard? 3 2014 Why is Internal Audit so Hard? Waste Abuse Fraud 4 2014 Waves of Change 1 st Wave Personal Computers Electronic Spreadsheets
White Paper. 10 Ways to Prevent Business Expense Fraud and Abuse
White Paper 10 Ways to Prevent Business Expense Fraud and Abuse The real impact of expense fraud Business expense fraud is a considerable issue across the world. According to a survey that Chrome River
Credit cards must only be used for GLA business, they should not be used for private expenditure
Guidelines for Corporate Credit Cards The GLA has a limited number of corporate credit cards to facilitate the purchasing of goods and services in emergencies and when travelling abroad. All cardholders
Contents. xiii xv. Case Studies Preface
Case Studies Preface xiii xv CHAPTER 1 What Is Fraud? 1 Fraud: A Definition 3 Why Fraud Happens 4 Who Is Responsible for Fraud Detection? 7 What Is a Fraud Awareness Program? 11 Screening Job Applicants
Data Mining/Fraud Detection. April 28, 2014 Jonathan Meyer, CPA KPMG, LLP
Data Mining/Fraud Detection April 28, 2014 Jonathan Meyer, CPA KPMG, LLP 1 Agenda Overview of Data Analytics & Fraud Getting Started with Data Analytics Where to Look & Why? What is Possible? 2 D&A Business
Data analysis for Internal Audit
Data analysis for Internal Audit What is Data Analytics Analytics is the process of obtaining an optimal or realistic decision based on existing data. Wikipedia Data analytics is the science of examining
Audit Program for Accounts Payable and Purchases
Form AP 50 Index Audit Program for Accounts Payable and Purchases Legal Company Name Client: Balance Sheet Date: Instructions: The auditor should refer to the audit planning documentation to gain an understanding
Fraud Detection & Data Analytics
September 2008 Fraud Detection & Data Analytics How to Utilize CAATs to detect fraud AN INDEPENDENT MEMBER OF BAKER TILLY INTERNATIONAL 505 AFFILIATE OFFICES WORLDWIDE Course Topics Overview of Data Analytics
Current Uses and Trends in ACL and Data Mining
Current Uses and Trends in ACL and Data Mining Weaver and Tidwell, L.L.P. January 10, 2013 Marlon B Williams, CPA, ACDA Partner, Assurance Reema Parappilly, CISA Senior Manager, IT Advisory Objective Discuss
3. Current Auditing Computerized Tools
- 17-3. Current Auditing Computerized Tools 3.1. Objective and Structure The objective of this chapter is to provide information about technological tools and techniques currently used by auditors. Section
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud
T&E Expense Reporting: Tips, Techniques & Strategies to Minimize Reimbursement Fraud FEATURED FACULTY: Richard B. Lanza, CPA, CFE, CGMA, President of Cash Recovery Partners LLC 973-729-3944 [email protected]
Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP [email protected]. Copyright 2015 Edward S.
MIS 520 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP [email protected] Fraud Awareness & Internal Controls Awareness Internal
Leveraging Data Analytics in Audits and Investigations
Leveraging Data Analytics in Audits and Investigations Jamie Ralls, CFE, ACDA Oregon Audits Division Western and Pacific Northwest Intergovernmental Audit Forum Joint Meeting September 3, 2015 Agenda Overview
P-Card Fraud Controls. Introduction
Introduction According to 2013 Association of Financial Professionals (AFP) Payments Fraud and Survey, the second most targeted payment type for fraud was corporate/commercial purchasing cards. 29% of
Internal Audit Tools. Selected Add-ins and Utility Programs for Increasing Audit Effectiveness and Efficiency
Internal Audit Tools Selected Add-ins and Utility Programs for Increasing Audit Effectiveness and Efficiency Agenda Excel Add-ins Spreadsheet IQ Active Data Spreadsheet Professional XL Audit Commander
Welcome to the topic on managing delivery issues with Goods Receipt POs.
Welcome to the topic on managing delivery issues with Goods Receipt POs. In this topic, we will explore how to receive incorrect shipments from a vendor in a goods receipt PO document. Sometimes your supplier
Controls should be appropriate to the scale of the assets at risk and the potential loss to the University.
POLICY SUPPORT PAPER MANAGING THE RISK OF FRAUD Risk and Controls in Specific Systems Purpose of the Paper The purpose of this paper is to provide guidance to managers and supervisors on controls that
SUGGESTED CONTROLS TO MITIGATE THE POTENTIAL RISK (Internal Audit)
Unit: Subject: Sarbanes-Oxley Act Review - Inventory Management Title: Risk & Control Identification Year end: MILL RAW MATERIALS Receiving of Raw Materials Raw materials are received and accepted only
PREPARING AUDITORS IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM
IN THEIR USAGE OF DATA ANALYTICS TOOL IN FRAUD PREVENTION PROGRAM Auditors need to understand that while audit findings are common, they are not necessarily fraud and due care is needed in building evidence.
Table of Contents. Data Analysis Then & Now 1. Changing of the Guard 2. New Generation 4. Core Data Analysis Tasks 6
Table of Contents Data Analysis Then & Now 1 Changing of the Guard 2 New Generation 4 Core Data Analysis Tasks 6 Data Analysis Then & Now Spreadsheets remain one of the most popular applications for auditing
Dan French Founder & CEO, Consider Solutions
Dan French Founder & CEO, Consider Solutions CONSIDER SOLUTIONS Mission Solutions for World Class Finance Footprint Financial Control & Compliance Risk Assurance Process Optimization CLIENTS CONTEXT The
Accounts Payable Best Practices
Accounts Payable Best Practices Presented by: Eddy Castaneda, CPA, MBA Accounts Payable Best Practices Top Practices AP Top Practices Document your current AP procedures Can identify overlapping work Can
MANUAL AUDIT SAMPLING
MANUAL AUDIT SAMPLING Sampling is the application of an audit procedure to less than 100% of the items within an account balance or class of transactions for the purpose of evaluating some characteristic
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples
Data Analytics Leveraging Data Visualization and Automation in Audit Real World Examples June 3, 2015 Cliff Stephens, CISA Agenda Introductions Technological Advances in Analytics Capitalizing on Analytics
Supplier Portal. Date: January 24, 2014. Purpose: Reference material for use by the Suppliers when reviewing settlement invoices.
Supplier Portal Title: Supplier Portal Date: January 24, 2014 Purpose: Reference material for use by the Suppliers when reviewing settlement invoices Pre-requisites: Security access has been set up and
Automating the Audit July 2010
Jamie Williams PwC, Systems & Process Assurance PwC Agenda 1. Technology and PwC State of Internal Audit Survey 2. Technology/Data Analytics 3. Continuous Monitoring 4. Common Software 5. ACL Scripts 6.
Real life experiences with Continuous Controls Monitoring (CCM) on Master Data. Pat Culpan Jeet Kadam
Real life experiences with Continuous Controls Monitoring (CCM) on Master Data Pat Culpan Jeet Kadam What is Master Data? Master data is the core data that is essential for operating an industry. The kind
AUDIT REPORT INTERNAL AUDIT DIVISION. Invoice Processing in UNAMID. Internal controls over invoice processing were inadequate and ineffective
INTERNAL AUDIT DIVISION AUDIT REPORT Invoice Processing in UNAMID Internal controls over invoice processing were inadequate and ineffective 1 June 2010 Assignment No. AP2009/634/18 INTERNAL AUDIT DIVISION
AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM
AP 571 PURCHASING CARD COMMERCIAL CREDIT CARD PROGRAM BACKGROUND This procedure is for the use and control of purchasing cards (a commercial credit card) for the purpose of obtaining goods and services
Continuous Auditing with Data Analytics
Continuous Auditing with Data Analytics Brooke Miller, CPA, CIA, CPCU [email protected] Sean Scranton, CPCU, CISSP, CISM, CISA [email protected] Overview Understand embedding data analytics
February 2, 2012 ACCOUNTS PAYABLE BEST PRACTICES
February 2, 2012 ACCOUNTS PAYABLE BEST PRACTICES IMPORTANCE OF A/P BEST PRACTICES After payroll, the largest disbursement of a firm s funds typically comes from Accounts Payable (A/P) Accounts Payable
THE ABC S OF DATA ANALYTICS
THE ABC S OF DATA ANALYTICS ANGEL BUTLER MAY 23, 2013 HOUSTON AREA SCHOOL DISTRICT INTERNAL AUDITORS (HASDIA) AGENDA Data Analytics Overview Data Analytics Examples Compliance Purchasing and Accounts Payable
EXFLOW NAV BROCHURE INCREASE PRODUCTIVITY IN YOUR AP DEPARTMENT LEVERAGE YOUR DYNAMICS NAV INVESTMENT WITH INDUSTRY BEST PRACTICE AP AUTOMATION
EXFLOW NAV BROCHURE INCREASE PRODUCTIVITY IN YOUR AP DEPARTMENT LEVERAGE YOUR DYNAMICS NAV INVESTMENT WITH INDUSTRY BEST PRACTICE AP AUTOMATION What is ExFlow NAV? For whom? ExFlow NAV is an add-on module
Internal Control Deliverables. For. System Development Projects
DIVISION OF AUDIT SERVICES Internal Control Deliverables For System Development Projects Table of Contents Introduction... 3 Process Flow... 3 Controls Objectives... 4 Environmental and General IT Controls...
Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen
Internal Controls and Fraud Detection & Prevention Harold Monk and Jennifer Christensen 1 Common Fraud Statements Everyone in government has an honest and charitable heart. It may happen other places,
Microsoft Confidential
Brock Phillips, CPA, CFE, CCEP Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft Audit Group Lou DeCola, CPA, CIA, CFE Forensic Accounting Sr. Manager Financial Integrity Unit Microsoft
In search of Excellence Series Research - Study Material No. 18
ACHIEVING EXCELLENCE IN AUDIT AND ACCOUNTS THROUGH DEVELOPING, IMPARTING, PRACTICING AND UPGRADING SKILLS AND COMPETENCES In search of Excellence Series Research - Study Material No. 18 Preface In Search
Mango s Health Check. How healthy is financial management in your not-for-profit organisation?
How healthy is financial management in your not-for-profit organisation? Version 3 2009 Mango 2nd Floor East, Chester House, George Street, Oxford OX1 2AU Phone +44 (0)1865 423818 Fax +44 (0)1865 423560
Training Guide: Customers CRM. Version 001. Training Prerequisite: Basic System Knowledge
Training Guide: Customers CRM Version 001 Training Prerequisite: Basic System Knowledge Inventory 2 Invoice Ltd 2013 Nimble Business Services Ltd 2013 Customers 01 1 Table of Contents Introduction... 3
WHITE PAPER HOW TO REDUCE RISK, ERROR, COMPLEXITY AND DRIVE COSTS IN THE ACCOUNTS PAYABLE PROCESS
WHITE PAPER HOW TO REDUCE RISK, ERROR, COMPLEXITY AND DRIVE COSTS IN THE ACCOUNTS PAYABLE PROCESS Based on a benchmark study of 250 companies with a total of more than 900 billion euro in Accounts Payable
Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013
Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager Published: 07 March 2013 Copyright Information in this document, including URL and other Internet Web site references,
Accounts Payable Automation
Accounts Payable Automation Dataline - a brief history Launched as privately owned company, based in Chatswood, Sydney. Became a leading proponent of distributed non-impact MICR technology We remain the
Auditing E-Business: Challenges and Opportunities
E-Commerce White Paper Auditing E-Business: Challenges and Opportunities ACL Services Ltd. 1550 Alberni St. Vancouver, BC, Canada V6G 1A5 Tel: +1-604-669-4225 Fax: +1-604-669-3557 E-mail: [email protected]
Better Business Through Data Analysis & Monitoring
CaseWare Analytics is an industry leader in providing technology solutions for audit and finance professionals, with over 400,000 users worldwide. Better Business Through Data Analysis & Monitoring 469
B Resource Guide: Implementing Financial Controls
What s in this Guide: I. Definition: What are Financial Controls? II. Why Do You Need Financial Controls? III. Best Practices: Financial Controls to Consider I. Definition: What are Financial Controls?
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Fundamental Data Analysis Techniques 2016 Association of Certified Fraud Examiners, Inc. Discussion Question For each data analysis technique discussed in this section,
Great Aycliffe Town Council. Purchase Ordering and Payment for Goods and Services Policy
Great Aycliffe Town Council Purchase Ordering and Payment for Goods and Services Policy Finance Section April 2013 1.0 Introduction 1.1 This policy sets out the Council s arrangements for ordering, receiving,
Leverage T echnology: Move Your Business Forward
Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright. Fulcrum Information Technology, Inc. Is Oracle ERP in Scope for 2014 Audit Plan? Learn,
Fraud data interrogation tools: COMPARING BEST SOFTWARE FOR FRAUD EXAMINATIONS
Fraud data interrogation tools: COMPARING BEST SOFTWARE FOR FRAUD EXAMINATIONS By Rich Lanza, CFE, CPA, PMP Fraud examiners now have a wide choice of data interrogation tools they can use themselves without
The course breaks down the Procurement Process into 5 Steps
The course breaks down the Procurement Process into 5 Steps Define Objective Logistics SCM in 5 steps The course breaks down the Procurement Process into 5 Steps Identify opportunities Capture Benefits
Copyright 2006 ACL Services Ltd. All rights reserved.
getting started getting started Copyright 2006 ACL Services Ltd. All rights reserved. No part of these materials may be reproduced, stored in a retrieval system, or transmitted, in any form or by any
An Introduction to Continuous Controls Monitoring
An Introduction to Continuous Controls Monitoring Reduce compliance costs, strengthen the control environment and lessen the risk of unintentional errors and fraud Richard Hunt, Managing Director Marc
1. Is it required that each company that bids on this RFP be pre-registered or pre-qualified prior to bidding?
To: From: All Prospective Bidders Purchasing Department Date: September 9, 2015 Subject: Inquiries and Responses RFP#: Fixed A/V Maintenance/Repairs/Equipment Services 102-2015 Inquiries and Responses:
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S
U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S A C a s e W a r e I D E A R e s e a r c h R e p o r t CaseWare IDEA Inc.
Expense Reports Training Document. Oracle iexpense
Expense Reports Training Document Oracle iexpense Prepared by FSCP Solutions Inc. Table of Contents Create (Enter) Expense Reports...1 Approved Expense Report... 18 Rejected Expense Report... 19 Entering
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education
Strong Corporate Governance & Internal Controls: Internal Auditing in Higher Education Contents Introduction Internal Audit as Trusted Advisor & Business Partner Big Ticket Items: Fraud, Revenue Leakage
Payment Procedures. Corruption Prevention Department
Payment Procedures Corruption Prevention Department best practices 貪 CONTENTS Pages Introduction 1 Procedural Guidelines 1 Payment Methods 2 Autopay 2 Cheques 3 Petty Cash 3 Payment Records 4 Control and
Global E-Business and Collaboration
Chapter 2 Global E-Business and Collaboration 2.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the major features of a business that are important for understanding the role
City of Berkeley. Accounts Payable Audit
City of Berkeley Accounts Payable Audit Prepared by: Ann-Marie Hogan, City Auditor, CIA, CGAP Teresa Berkeley-Simmons, Audit Manager, CIA, CGAP Frank Marietti, Senior Auditor, CIA, CGAP Presented to Council
Multi Channel Invoice Processing the way forward
Multi Channel Invoice Processing the way forward eflow GUIDE: ONE PLATFORM. MULTIPLE SOLUTIONS Top Image Systems A Guide to: Multi Channel Invoice Processing Money makes the world go round, or so they
Inventory Control System Administration Manual
Inventory Control System Administration Manual Confidential Information This document contains proprietary and valuable, confidential trade secret information of APPX Software, Inc., Richmond, Virginia
Sage ERP I White Paper. An ERP Guide to Driving Efficiency
I White Paper An ERP Guide to Driving Efficiency Table of Contents Executive Summary... 3 Best-in-Class Organizations Look to Enhance Efficiency... 3 How ERP Improves Efficiency... 3 Results... 6 Conclusion...
Leveraging Big Data to Mitigate Health Care Fraud Risk
Leveraging Big Data to Mitigate Health Care Fraud Risk Jeremy Clopton, CPA, CFE, ACDA Senior Managing Consultant BKD, LLP Forensics & Valuation Services Introduction Health Care Is Victimized by Fraud
OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT
County of San Diego Auditor and Controller OFFICE OF AUDITS & ADVISORY SERVICES ACCOUNTS PAYABLE VENDOR MASTER FILE AUDIT FINAL REPORT Chief of Audits: Juan R. Perez Senior Audit Manager: Lynne Prizzia,
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
[1] Viewing invoice details:
This helpcard describes how to find out when an invoice will be paid [1] Viewing invoice details: The Invoice List screen also shows other invoice/credit note information as outlined below:- SupplierInvoice
Internal Controls, Fraud Detection and ERP
Internal Controls, Fraud Detection and ERP Recently the SEC adopted Section 404 of the Sarbanes Oxley Act. This law requires each annual report of a company to contain 1. A statement of management's responsibility
Premium Audit Guide. What is a premium audit? Types of audits. Payroll as a premium basis. Information requested at time of audit
Premium Audit Guide What is a premium audit? The purpose of a premium audit is to verify information necessary to calculate an insured s final premium for a specific policy term. When a policy is initially
Great Expectations : How to Detect and Prevent Fraud using Data Analysis
Technology for Business Assurance Great Expectations : How to Detect and Prevent Fraud using Data Analysis Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application ACL Services Ltd
1 (a) Audit strategy document Section of document Purpose Example from B-Star
Answers Fundamentals Level Skills Module, Paper F8 (IRL) Audit and Assurance (Irish) June 2009 Answers 1 (a) Audit strategy document Section of document Purpose Example from B-Star Understanding the entity
White Paper - Travel & Entertainment Spend Analytics Best Practices
White Paper - Travel & Entertainment Spend Analytics Best Practices T&E is probably your company s second largest discretionary expense, representing on average as much as 6% of all corporate expenses.
Accounts Payable. Best Practices: Existing Control: Control Gap: Controls Evaluation and Gap Analysis. Purchasing
Accounts Payable Gap Analysis: POS identifies the following Best Practices as efficient and effective control processes for the above risk. Listed for comparison are the controls currently in place, if
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services
Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services Agenda Fraud Overview Fraud Prevention Fraud Detection Fraud Response Questions Page 2 Fraud Overview
