Fraud Prevention Techniques for Higher Education



Similar documents
Internal Audit Charter and operating standards

Chapter 7 Business Continuity and Risk Management

Creating an Ethical Culture and Protecting Your Bottom Line:

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

Change Management Process

Communicating Deficiencies in Internal Control to Those Charged with Governance and Management

ENTERPRISE RISK MANAGEMENT ENTERPRISE RISK MANAGEMENT POLICY

.100 POLICY STATEMENT

Gravesham Borough Council

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

Risk Management Policy AGL Energy Limited

Audit Committee Charter

Audit Committee Charter. St Andrew s Insurance (Australia) Pty Ltd St Andrew s Life Insurance Pty Ltd St Andrew s Australia Services Pty Ltd

How To Write An Ehsms Training, Awareness And Competency Procedure

B Bard Video Games - Cnflict F interest

PADUA COLLEGE LIMITED ACN ABN

AUDIT AND RISK COMMITTEE TERMS OF REFERENCE

Purpose Statement. Objectives

Duty Statement Manager The Early Years at Seymour (TEYS)

Hearing Loss Regulations Vendor information pack

Sources of Federal Government and Employee Information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Request for Resume (RFR) CATS II Master Contract. All Master Contract Provisions Apply

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

Office of the Superintendent of Financial Institutions. Internal Audit Report. Human Resources Performance Management.

Multi-Year Accessibility Policy and Plan for NSF Canada and NSF International Strategic Registrations Canada Company,

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

THE CITY UNIVERSITY OF NEW YORK IDENTITY THEFT PREVENTION PROGRAM

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES

VCU Payment Card Policy

Chief Finance and Operations Officer IfM Education and Consultancy Services (IfM ECS)

RATIONALE TERMS OF REFERENCE FOR THE QUALITY COMMITTEE UNDER THE EXCELLENT CARE FOR ALL ACT. Authority

BLUE RIDGE COMMUNITY AND TECHNICAL COLLEGE BOARD OF GOVERNORS

SECTION J QUALITY ASSURANCE AND IMPROVEMENT PROGRAM

Personal Data Security Breach Management Policy

Presentation: The Demise of SAS 70 - What s Next?

NYU Langone Medical Center NYU Hospitals Center NYU School of Medicine

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

Business Plan

Maintain a balanced budget primarily the General & Park Funds

Privacy Breach and Complaint Protocol

Appendix H. Annual Risk Assessment and Audit Plan 2013/14

Session 9 : Information Security and Risk

10 th May Dear Peter, Re: Audit Quality in Australia: A Strategic Review

Key Steps for Organizations in Responding to Privacy Breaches

FINANCE SCRUTINY SUB-COMMITTEE

An employer s Guide to engaging an occupational health physician

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

Information Security Policy

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

CORPORATE CREDIT CARD POLICY

Accident Investigation

FIREFIGHTER HEART AND CIRCULATORY MALFUNCTION BENEFITS PROGRAM STANDARD OPERATING GUIDELINES Approved by the DOLA Executive Director July 1, 2014

Heythrop College Disciplinary Procedure for Support Staff

E-Business Strategies For a Cmpany s Bard

State Fleet Card Oversight Usage and Responsibilities

Employee Benefits Liability Policy

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions

17 Construction environmental management plan (CEMP)

Remote Working (Policy & Procedure)

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

CDE Data Governance Program - CDE-Specific and SLDS (P20+) Programs

Process for Responding to Privacy Breaches

Accessible Service Policy

Process Improvement Center of Excellence Service Proposal Recommendation. Operational Oversight Committee Report Submission

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Guidelines on Data Management in Horizon 2020

Legal Issues Bulletin

Strategic Plan

MANITOBA SECURITIES COMMISSION STRATEGIC PLAN

Human Resources Policy pol-020

GUIDANCE FOR BUSINESS ASSOCIATES

Cell Phone & Data Access Policy Frequently Asked Questions

CMS Eligibility Requirements Checklist for MSSP ACO Participation

NEW FUTURES APPLICATION

Chris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation

Wire Transfer Request

Objective: Successfully work with a new employee from initial hire through data entry in PHR and follow up.

CHARTER OF THE COMPENSATION COMMITTEE OF THE BOARD OF DIRECTORS OF UPLAND SOFTWARE, INC.

Transcription:

Fraud Preventin Techniques fr Higher Educatin Speakers: Brenda Buetw, Crwe Hrwath LLP Jennifer Richards, Crwe Hrwath LLP David English, Augustana Cllege Date: Octber 6, 2014

Sessin Gals Identify the different frms f fraud. Recgnize areas where institutins f higher educatin are particularly vulnerable t fraud. Understand the rle f management and thse charged with gvernance in preventin and detectin f fraud. Learn hw t develp and maintain a fraud risk assessment prgram.

Intrductin t Fraud Webster s Dictinary: Deceit, trickery; cheating, intentinal deceptin t cause a persn t give up prperty r sme lawful right. AICPA EDP Fraud Review Task Frce: Any intentinal act, r series f acts, that is designed t deceive r mislead thers and that has an impact r ptential impact n an rganizatin s financial statements. The Accuntant s Handbk f Fraud & Cmmercial Crime: Fraud is criminal deceptin intended t financially benefit the deceiver.

Fraud Triangle DETECTION PREVENTION INVESTIGATION

Occupatinal Fraud & Abuse Classificatin System 2010 Assciatin f Certified Fraud Examiners Inc.

Embezzlement High Risk Areas fr Higher Educatin Check mailed t the rganizatin Printing expense Pstage expense Persnnel related expenses

Examples A. University Cntributins Crdinatr 1. University credit card 2. Schedule vs. expenses 3. Billing statement cntrl 4. Discvered after persn left the rganizatin B. Cntrller in cntrl 1. Cpy, Fax, Lcked Office, N Secretary 2. Finance Cmmittee 3. Shell Cmpany acrnyms, vendr management, verificatin 4. Building Imprvements 2 buildings 5. Did nt cnsider year ver year ttal csts 6. Discvered by new Auditr

Actual Cases A. Bkstre cashier 1. Fraudulent refunds t persnal credit card 2. Shrt time frame; 2 3 mnths lng 3. Discvered by merchant prcessr 4. Imprtance f tracking register cntrl B. External IT Penetratin 1. External hacker accessed ACH system, created false payrll file 2. File date was nt n nrmal pay date 3. Cntrller identified it as abnrmal, did nt initiate payment 4. Imprtance f IT security and separate apprval f n us transfers

Actual Cases (cnt.) A. External ACH 1. Third party used check t create fraudulent ACH 2. This payment avids Psitive Pay verificatin 3. Discvered during rutine bank recnciliatin 4. Instituted debit blcker, where nly pre apprved merchants may receive and ACH frm cllege bank accunt B. Internal cnstructin fraud 1. Emplyee created false vendrs, created cntracts and POs t them fr wrk dne by ther vendrs 2. Fraud was cmplex, with multiple signatries, fictitius cntracts and releases 3. Discvered during request fr warranty repair 4. Over $2.0 millin ver 3 years

Rle f Management and Thse Charged with Gvernance Rle f Management Tne at the tp Prmte awareness f fraud risk management prgram Identificatin f risks Assess perating and reprting risks peridically Identify and cnsider the likelihd and significance f such risks Preventin and detectin f fraud Prmte that effective detective cntrls are in place Take apprpriate actin fr risks identified Establish plicies and prcedures t mitigate risks Mnitr internal cntrls Develp a prcess t investigate fraud and take crrective actin

Rle f Management and Thse Charged with Gvernance (cntinued) Rle f Thse Charged with Gvernance Define the rle f the Bard r Audit Cmmittee as it relates t fraud Set the apprpriate tne at the tp Maintain versight f the fraud risk assessment Understand fraud risks at the rganizatin Mnitr management s activities related t internal cntrls and financial reprting Obtain regular reprts frm management Interact with external auditrs, and utside experts as necessary

Fraud Risk Management: where t begin Fraud risk assessment Wh is respnsible? What is invlved? Written plicies and prcedures Summary f prcedures and activities already in place t aid in assessment Can cme in many different frmats Single cmprehensive dcument addressing all aspects f fraud risk management Brief utline emphasizing the main characteristics f the fraud risk prgram Outline within a cntrl framewrk, referencing separate plices/prcedures

Fraud Risk Management: where t begin (cntinued) Update n a rutinely scheduled basis Needs t evlve with the rganizatin Invlve apprpriate persnnel Cnsider relevant fraud schemes and situatins Link the fraud risks t apprpriate cntrls t prevent/detect

Fraud Risk Assessment: three step prcess 1. Identify inherent fraud risks Incentives, pressures, and pprtunities Include accunt level, financial reprting, and IT specific risks 2. Assess likelihd and significance f each fraud risk Histrical infrmatin Knwn fraud schemes frm ther rganizatins Interviews with staff 3. Respnd t likely and significant fraud risk Cst benefit analysis Nte: Results f this brainstrming shuld be dcumented in sme rutine frmat t help assess the infrmatin

Fraud Risk Assessment: dcumentatin Example brainstrming dcumentatin matrix included in handuts: Fraud Risk Assessment Matrix

Fraud Risk Assessment: cnsidering ptential fraud Cnsider the fraud that culd ccur Wh, internal and external, culd be invlved If the ptential fraud is cllusive, cnsider the detective cntrl that wuld identify the fraud Hw may the perpetratr explit a weakness in internal cntrls? Hw culd a perpetratr circumvent r verride cntrls? Hw culd a perpetratr cnceal a fraud? Matrix handut includes several examples t help aid in brainstrming

Fraud Risk Management Prgram Dcumentatin f fraud risk gvernance Wh is respnsible Organizatin s cmmitment and apprach Identify rganizatin wide anti fraud cntrls Identify prcess level anti fraud cntrls r refer t separate plicies Apprval by Bard f Directrs Cmmunicatin t emplyees, dnrs, custmers, etc. Cntinuus updates/mnitring Reprting Prcedures and Whistleblwer Prtectin Dcumentatin shuld nte the prcess t fllw if fraud is detected Cnsider prmting fraud reprting prcedures n intranet r ther means

Fraud Risk Preventin: aviding future frauds Set the tne at the tp Create a culture where fraud is discuraged and reprting encuraged When fraud is discvered, deal decisively with emplyees invlved Spend time t think f risk pints and hw a fraud culd be perpetrated With limited resurces, what is material? Plan hw culd a fraud ccur, and then devise strategies t militate Similar t emergency planning Ex: Rather than an entire false payrll file (easy t spt) what if hacker inserts a fake emplyee int EVERY payrll file?

Fr mre infrmatin, cntact: Brenda Buetw, CFE, CAMS, MBA Senir Manager, Crwe Hrwath LLP brenda.buetw@crwehrwath.cm David English Vice President fr Finance and Administratin, Augustana Cllege davidenglish@augustana.edu Jennifer A. Richards, CPA Senir Manager, Crwe Hrwath LLP jennifer.richards@crwehrwath.cm