Fraud and Role of Information Technology. September 2008

Similar documents
Antifraud program and controls assessment grid*

AN AUDIT OF INTERNAL CONTROL OVER FINANCIAL REPORTING THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS:

Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

FRAUD RISK ASSESSMENT

An Examination of an Entity s Internal Control Over Financial Reporting That Is Integrated With an Audit of Its Financial Statements

Fraud Prevention and Deterrence

Centre for Corporate Governance. Sample listing of fraud schemes

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

Sarbanes-Oxley Section 404: Management s Assessment Process

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

The auditors responsibility to consider fraud in an audit of financial statements

FRAUD RISK & INTERNAL AUDIT

Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement

Using COBiT For Sarbanes Oxley. Japan November 18 th 2006 Gary A Bannister

September 28, Audit s Role in Governance, Risk Management and Internal Control

The Auditor s Responsibilities Relating to Fraud in an Audit of Financial Statements

INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

In-Depth Guide to Public Company Auditing: The Financial Statement Audit

Consideration of Fraud in a Financial Statement Audit

Auditing Standard 5- Effective and Efficient SOX Compliance

CHAPTER 7 PLANNING THE AUDIT: IDENTIFYING AND RESPONDING TO THE RISKS OF MATERIAL MISSTATEMENT

Inspection Observations Related to PCAOB "Risk Assessment" Auditing Standards (No. 8 through No.15)

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

A Guide to Forensic Accounting Investigation. 2nd Edition

How To Audit A Company

COSO Internal Control Integrated Framework (2013)

Master Document Audit Program

U S I N G D A T A A N A L Y S I S T O M E E T T H E R E Q U I R E M E N T S O F R I S K B A S E D A U D I T I N G S T A N D A R D S

Fraud Risk Management Procedures

Internal Audit Guidelines Fraud Risk in Broker-Dealers

Deloitte Forensic Fraud Risk Management

STANDING ADVISORY GROUP MEETING

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

) ) ) ) ) ) ) ) ) ) ) ) OBSERVATIONS ON AUDITORS' IMPLEMENTATION OF PCAOB STANDARDS RELATING TO AUDITORS' RESPONSIBILITIES WITH RESPECT TO FRAUD

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Audit Quality Thematic Review

How To Audit A Company

Forensic Auditing: The Audit of the Future, Today. Instructor: Ron Durkin, CFE, CPA/CFF, CIRA

How To Find Out If A Company Misstatement Is True

[RELEASE NOS ; ; FR-77; File No. S ]

Guide to Internal Control Over Financial Reporting

The Importance of IT Controls to Sarbanes-Oxley Compliance

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 315

Communicating Internal Control Related Matters Identified in an Audit

RISK ASSESSMENT CHECKLIST

Compliance and Ethics at the Federal Reserve Bank of New York

Risk and Controls 101

How To Audit A Financial Statement

Audit Phases. Phase 1: Planning and Risk Identification

Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Frequently Asked Questions

Fraud Policy FEBRUARY 2014

A Publication of the Center for Audit Quality

10-1. Auditing Business Process. Objectives Understand the Auditing of the Enteties Business. Process

Consideration of Fraud in a Financial Statement Audit

Module 6 Documenting Processes and Controls

Cybersecurity The role of Internal Audit

INTERNATIONAL STANDARD ON AUDITING 330 THE AUDITOR S RESPONSES TO ASSESSED RISKS CONTENTS

Enterprise Risk Management

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

Forensic Audit Building a World Class Program

Sarbanes-Oxley Control Transformation Through Automation

California ISO Audit of the Financial Statements for the Year Ending December 31, 2015 December 18, 2015

CHAPTER 12 AUDITING LONG-LIVED ASSETS: ACQUISITION, USE, IMPAIRMENT, AND DISPOSAL

Fraud Risk Management and Internal Audting

A Sarbanes-Oxley Roadmap to Business Continuity

CHAPTER 9 AUDITING THE REVENUE CYCLE

Internal Control Systems and Maintenance of Accounting and Other Records for Interactive Gaming & Interactive Wagering Corporations (IGIWC)

COSO 2013: WHAT HAS CHANGED & STEPS TO TAKE TO ENSURE COMPLIANCE

The Information Systems Audit

Internal Controls. A short presentation from Your Internal Audit Department

COSO s 2013 Internal Control Framework in Depth: Implementing the Enhanced Guidance for Internal Control over External Financial Reporting

A Framework for Managing Crime and Fraud

Corporate Resiliency Managing g the Growing Risk of Fraud and Corruption

SARBANES OXLEY: ACHIEVING COMPLIANCE BY STARTING WITH ISO 17799

Implementation Tool for Auditors

Risk Management Advisory Services, LLC Capital markets audit and control

Plan for the audit of the 2011 financial statements

THE AUDITOR S RESPONSES TO ASSESSED RISKS

OBSERVATIONS FROM 2010 INSPECTIONS OF DOMESTIC ANNUALLY INSPECTED FIRMS REGARDING DEFICIENCIES IN AUDITS OF INTERNAL CONTROL OVER FINANCIAL REPORTING

1. FPO. Guide to the Sarbanes-Oxley Act: IT Risks and Controls. Second Edition

Electronic Audit Evidence (EAE) and Application Controls. Tulsa ISACA Chapter December 11, 2014

[300] Accounting and internal control systems and audit risk assessments

Fraud Control Theory

Audit Evidence. AU Section 326. Introduction. Concept of Audit Evidence AU

Application controls testing in an integrated audit

Internal Financial Controls

Sharon Kurek, CPA, CFE Director of Internal Audit

Dr. Thomas Nösberger. A short overview

Impact of New Internal Control Frameworks

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

Auditor's Objective in an Audit of Internal Control Over Financial Reporting

Fraud Checklist. From the enquiries made and procedures performed in completing Part B of this checklist we consider the risk of irregularities to be

Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, Torsten Wolf, CPP Head of Group Security Operations

Transcription:

Fraud and Role of Information Technology September 2008

Agenda IT Value Proposition Slide 2

Prior Interpretations of Internal Control Structure Have Addressed Three Separate Parts Which Were Audited Somewhat Independently. But This Is No Longer Possible Technology Has Changed Our World Enterprise Management Business Process Finance / Accounting Business Process Sales/Marketing Business Process Customer-Facing Apls Business Process Customer Experience Business Process Contact Centers IT General Controls Program Changes, Program Development, Access to Programs and Data, Computer Operations Slide 3

While Audit Approaches Toward Fraud Have Changed, So Have the Tools and Approaches Taken By Today s Fraudster Fraud is now committed using As Companies Implement New Manual Fraud Controls, Our Fraudster Has Also Used Automated Means To Override Them. We Have To Both Validate That Current Key Controls Work and Think Of New Ways These Perpetrators May Challenge Them in the Future Slide 4

Failed ITGCs can Adversely Impact our Integrated Audit Types of Controls General Business Activities AS5 s Focus Includes: Entity Level Controls Manual and Application Level Controls IT General Controls Business Process Finance / Accounting Enterprise Management Business Process Sales/Marketing Business Process Customer-Facing Apls Business Process Customer Experience Business Process Contact Centers Identifying risks and controls related to financial reporting. Understanding and leveraging company level controls and their relationship to financial statement assertions. Understanding the role of relevant information technology general controls for both automated and IT dependent controls and processes. IT General Controls Program Changes, Program Development, Access to Programs and Data, Computer Operations Evaluating, validating and documenting our conclusion on the operating effectiveness of the key controls A failure in the ITGCs can provide the opportunity for the rest of the control framework to fail Slide 5

Along with ITGCs, Addressing Fraud in the Integrated Audit Includes Evaluating Key Application Controls and Application User Access Security Controls and Their Role in the Key Business Process Controls Financial Statement Line Item (Significant Account) Transaction / Sub- Transaction Application User Access Security Controls Business Process Controls (Manual Control) Follow up of exceptions identified by control reports Automated Application Controls / Processes Application Generated Key Reports Information Technology General Computer Controls (ITGCs) Each of the Areas in Yellow Offer the Potential Fraudster Opportunities to Commit Fraud. Deficiencies in These Areas Can Impact Our Substantive Testing Plan and our Fraud Procedures Including Journal Entry Testing Slide 6

Layers of ITGCs and their relative risk INF HS APP Increasing Level of Risk DB Infrastructure (INF) Host Server (HS) Application (APP) Database (DB) Slide 7

Layers within ITGCs Which may be Prone to Higher Fraud Risks INF HS Increased Potential for Fraud APP DB Increased Potential for Fraud Infrastructure (INF) Host Server (HS) Application (APP) Database (DB) Slide 8

IT and Business Process Redundant and Compensating Controls Some relative considerations on the risk and potential mitigation of IT General Controls issues Some deficiencies in these areas would not have a direct impact on data or a financial statement assertions and may be mitigated by other IT General Controls at the Application and Database layer INF HS APP DB Some deficiencies in these areas may be determined to have a direct impact on data or a financial statement assertion and need to be evaluated in the context of the business process redundant and compensating controls Slide 9

Effective Auditing in a Complex IT Environment Requires Effective Coordination Among All Specialist Groups Core Audit At Planning Meeting IT Audit Data Mgmt Prior to start of year-end testing During SAS 99 Brainstorming Session During Completion of the Fraud Risk Assessment Memo Prior to start of Qtrly 1-3 Testing Once 1 st test results in Reviewing final test results Planning Execution Final Typical Audit Process Timeline Meeting the Requirements of SEC and PCAOB Regulations (SAS 99, AS5) Efficiently and Effectively Makes Close Coordination Important Slide 10

Value Drivers for IT Audit Coordinated Involvement In the Integrated Audit IT Audit s involvement can serve to expand and strengthen the audit team s understanding of the overall business processes and controls as well as the integration of financial processes with systems. We can help determine whether Fraud Risks are completely identified, presented to the Audit Team to be addressed in a coordinated manner and tested in an efficient, effective manner. We can address the concerns noted in the PCAOB 4010 report regarding fraud detection and how it can be applied to engagements. With IT Audit s coordinated involvement, we can identify and respond with integrated audit procedures to unique areas of fraud risk in systems and business processes. Many IT Audit professionals have industry specific business process skills that can be deployed on engagements to drive an integrated effort and improve audit quality. Including IT Audit s understanding of the application systems architecture when developing SAS 99 testing, we can facilitate focused testing based upon risk. Slide 11

Along with Enhanced Delivery in the Integrated Audit Environment, Numerous Other Areas Exist to Add Value Can My IT Auditors Become Forensic- Capable? Fraud Found At XYZ! Is My Investment Trading Environment Secure and Controlled To Prevent Fraud? Is My Data Protected From Abuse As It Travels Overseas? What Other IT Areas Open Up The Opportunity For Fraud? We Only Have to Think of the Challenges Faced In Meeting Other Regulatory Requirements Slide 12

Making The Vision A Reality Slide 13

Overall Anti-Fraud Framework Slide 14

Developing a Fraud Risk Response Internal Control Environment and Objective Setting Oversight by Audit Committee and Board Code of Conduct/ Ethics Whistle-blower / hotline Investigation / Remediation Hiring and Promotion Procedures Other Control Environment Considerations Event Identification, Risk Assessment and Risk Response Define Risk Spectrum Reassess Fraud Risk. Change in circumstances. Acquisitions/ divestitures. Restructurings. Control issues Identify Significant Areas of Risk within Each Fraud Category Monitoring Monitor the Identified Controls Perform Fraud Auditing Procedures Identify Fraud Schemes Related to each Fraud Category Identify Business Units / Locations where Fraud Schemes are applicable Control Activities Evaluate Design & Effectiveness of Controls Identified Link Control Activities to Fraud risks identified Consider Likelihood, Significance and Pervasiveness of the Risks identified Change Management Information and Communication System Implementation Access to Programs and Data Computer Operations Slide 15

Fraud Schemes and Audit Risk Response Financial Statement Audit Disclosure Sr Mgmt or Employees with Significant Role in Financial Reporting Aiding & Abetting Financial Statement Manipulation Misappropriation of Assets Unauthorized Receipts and Expenditures Procedures designed to provide reasonable assurance that financial statements free of material misstatements due to fraudulent financial reporting or misappropriation of assets Does not extend to other categories of fraud or misconduct Limited to fraud risks, having potential material financial statement impact Internal Controls Audit Management must develop pervasive and specific programs and control activities to prevent and timely detect Auditor evaluates design and validates effectiveness of management s antifraud programs and controls Limited to fraud and misconduct risks, having potential material financial statement impact Slide 16

Evaluating Antifraud Programs and Controls Control / Internal Environment Tone at top Code of conduct/ethics Ethics hotline Hiring and promotion Oversight committee Investigative process Remediation Control Activities Linking controls to identified fraud risks Information / Communication Information systems & technology Knowledge management Training Fraud Risk Assessment Systematic process Level within agency Likelihood and significance Monitoring Ongoing monitoring by management Separate after the fact evaluations by internal audit Slide 17

Evaluating Antifraud Programs and Controls Internal Environment Tone at Top Codes of Conduct / Ethics Should apply to all accounting and financial oversight personnel Must be communicated effectively Anonymous Reporting Audit committee oversight and independent of management Hiring and Promotion Procedures Background investigations for persons of trust Also consider process for agents, vendors, etc. Audit Committee Oversight Passive not adequate Active discussion of fraud Investigation / Remediation Standard investigative process Adequate remediation to prevent recurrence Slide 18

Evaluating Antifraud Programs and Controls Assessing Fraud Risks Systematic Rather Than Haphazard or Informal Business Unit and Significant Account Address All Categories of Fraud Misappropriation of assets Financial statement manipulation Unauthorized receipts and expenditures Fraud by senior management Aiding and abetting Disclosure fraud Likelihood and Significance More than remote More than inconsequential financial statement impact Slide 19

Evaluating Antifraud Programs and Controls Linking Control Activities Management Should Identify Processes, Controls, and Other Procedures That Are Needed to Mitigate Identified Risks Very broad, e.g., approvals, authorizations, verifications, reconciliations, segregation of duties, reviews of operating performance, background investigations, physical security Should Occur Throughout Organization, at All Levels and in All Functions Slide 20

Evaluating Antifraud Programs and Controls Information Communication Information Systems & Technology Controls Technology enabled fraud, e.g., holding books open Prevention and detection of unauthorized access Inappropriate modification of computer programs System override Ability to investigate computer misuse Knowledge Management Identified fraud risks Strengths and weaknesses of antifraud control activities Suspicions and allegations about fraud; and Remediation efforts Training Frequency Scope and sufficiency Slide 21

Evaluating Antifraud Programs and Controls Fraud Monitoring and Auditing Management: On-going, Day to Day Monitoring Embedded into normal operating activities Includes regular management and supervisory activities Should leverage available information technology Internal Audit: After The Fact Evaluation Contingent upon risk and effectiveness of ongoing monitoring Address fraud risk in planning and executing internal audit cycle IA includes experienced fraud risk professionals Fraud auditing forensic investigation Fire safety experts vs. Fire-fighters Forensic Investigation Detailed review of the event Leverage the information technology based audit trails Facilitating the root cause identification Slide 22

The Role of Information Technology Slide 23

The Role of Information Technology Planning Participating in the Fraud Risk assessment and brainstorming processes Identifying IT specific risks and relevant IT control activities Understanding the business process control reliance on application systems and reports Understanding the thresholds that business process controls operate and where they are fallible Understanding areas of potential override inside or outside of the application systems Execution Including key IT organizational personnel in fraud inquiries Directing testing efforts leveraging an understanding of the information system s interconnectivity and operation Assessing IT control activities Suggesting improvements in IT control activities and information retention requirements Guiding Principle is Integration and Alignment Slide 24

Anti-Fraud Framework The Role of IT IT Control Environment Organization monitoring against objectives IT personnel understand their responsibility to internal control Reporting of significant IT events and failures to senior management Promotion of the company culture of integrity Slide 25

Anti-Fraud Framework The Role of IT Fraud Event Identification and IT Risk Assessment: Participate and Complete Fraud Risk Assessment - Identify potential scenarios integrating the IT point of view - Determine IT integration points and risk areas Directing the scope of manual efforts (e.g. SAS99 Journal Entry testing) Confirming the reliance on key IT systems Slide 26

Facilitating Brainstorming Professional skepticism and a consideration of fraud possible in every process. Critical evaluation is necessary. Considerations: Prior years experience General risk profile Industry / Geographic issues Incentives (not just formal compensation plans) Pressures Prior year deficiencies Previously reported misconduct Risks identified during Sarbanes testing of controls Internal Audit / Management Assessment No Consideration of Controls During Brainstorming Include knowledgeable representative from audit specialist groups particularly IT Slide 27

Fraud Schemes and the Role of IT Brainstorming Process COMPREHENSIVE Comprehensive SOX & USSG Financial Reporting & Criminal Conduct SOX Financial Reporting (Minimum for SEC Registrants) Slide 28

Fraud Schemes and the Role of IT Brainstorming Process Disclosure Sr Mgmt or Employees with Significant Role in Financial Reporting Aiding & Abetting Financial Statement Manipulation Misappropriation of Assets Unauthorized Receipts and Expenditures Implications of Fraud & Misconduct Reputation Risk Operational Risk Legal/Compliance Risk Financial & Non-Financial Reporting Motivations to Commit Fraud Incentives Pressures Financial Statement Manipulation Improper revenue recognition Asset overstatement/liability understatement Significant management estimates Inter-company and suspense accounts Significant & unusual transactions Asset Misappropriation Cash Payroll Inventory Fixed Assets Other Slices of Fraud Pie. Slide 29

Fraud Schemes and the Role of IT Brainstorming Process Revenue Recognition Schemes Bill & hold transactions Trade loading / channel stuffing Customer side agreements Backdating sales agreements Over-accrual of vendor rebates Misappropriation of Assets Schemes Cash skimming Inventory theft Sales & marketing fraud Outsourcing fraud Overstatement of Assets Schemes Fraudulent inventory capitalization Overstatement of inventory counts Overstatement of trade receivables Improper slotting fee capitalization Unauthorized Receipts / Expenditures Schemes Improper vendor allowances Commercial bribery Justifications / rationalization Slide 30

Fraud Schemes and the Role of IT Brainstorming Process Predicting the Unpredictable is Key Think like the Devil when assessing fraud & misconduct risk! How would the Devil manage your business unit? What would happen if the Devil were a vendor or customer? What if the Devil was an employee? Slide 31

Fraud Schemes and the Role of IT Brainstorming Process Incentives / Pressures: Financial management pressure on IT personnel Malicious intent Opportunity: Super user / privileged access at the application level Direct data access Ability to obscure changes / logging within the system Rationalization: IT personnel misunderstanding the nature of changes requested Accountability for transactions completed in the system Slide 32

Fraud Schemes and the Role of IT Develop a Response Significance Rankings: - Material (M) - Indirectly Material (IM) - More than Inconsequential (MI) - Inconsequential (I) Inherent Likelihood Rankings: - Probable (P) - Reasonably Possible (RP) - Remote (R) Consider "reasonably possible" quantitative impact Consider "incentives and pressures" Consider "reasonably possible" qualitative impact Consider "reasonably possible indirect impact Slide 33

Fraud Schemes and the Role of IT Develop a Response Exit activities giving rise to risk Reduce risk likelihood or impact, or both Transfer or otherwise share risk No action taken Slide 34

Fraud Schemes and the Role of IT Develop a Response Potential Fraud & Misconduct Risk Link & Evaluate Specific Control Activity Periodic Fraud Auditing Detection Procedures Red (high) (M/P, M/ RP or MI/P) Yellow (medium) (MI/RP or IM/P or RP) Blue (guarded) (M/ R) Yes Yes Optional depending upon severity Yes Yes Optional depending upon severity and quality of controls Green (low) (IM/R) No No Slide 35

Fraud Schemes and the Role of IT Develop a Response Slide 36

Anti-Fraud Framework The Role of IT IT Entity & Process Level Control Activities: Identify the IT and Business Process Controls Validate control design Develop the testing approach with regard to IT and Business Controls Review systems changes on a pre-implementation basis Slide 37

Anti-Fraud Framework The Role of IT Leverage the Fraud Triangle Opportunity: Seal the gaps and cracks Incentives & pressures: Protect good people from committing bad acts Rationalization: What would their mothers say? Evaluate design Address potential collusion and management override Consider practicality of segregation of duties Validate operating effectiveness Test like any other control activity with observations, walkthroughs, interviews, document review and/or reperformance Slide 38

Anti-Fraud Framework The Role of IT IT Monitoring Activities Automated controls used to monitor real time Direct Access to Data monitoring Security compliance monitoring Internal Audit functions Slide 39

Anti-Fraud Framework The Role of IT Fraud Risk Factors and Indicators Fraud risk factors -- increased likelihood that fraud will be committed Analogy: dry and hot conditions increase the likelihood of fire Fraud risk indicators -- indicia that fraud might have occurred or is occurring Analogy: smoke might indicate that there is a fire Slide 40

Anti-Fraud Framework The Role of IT Fraud Risk Factors and Indicators Example: Trade loading / channel stuffing Fraud risk factors Common/accepted industry practice that can be easily abused to manipulate sales revenues Company does not enforce standard policies and procedures for negotiating, approving, executing and documenting sales agreements Sales commission structure weighted heavily toward period-end revenue goals Fraud risk indicators Large, numerous or unusual sales transactions occurring shortly before the end of the period Increase in volume of customer returns Significant increase or excess levels of inventory in the distribution channel Build up of aged accounts receivable balances Slide 41

Anti-Fraud Framework The Role of IT Fraud Auditing Applies auditing techniques to search for fraud indicators Techniques include: - Inquiry & interview - Analytics - Targeted testing of transactions - Electronic data fraud detection tools (CAATs) Design real time detection / monitoring procedures Slide 42

Anti-Fraud Framework The Role of IT Example: Trade loading / channel stuffing Inquiry & interview Inquire of accounting personnel as to sales activity recorded close to reporting period ends Analytics / CAATs Analyze the ratio of sales in the last week or month of the period to total sales for the period Compare gross margin, overall and by product line and major vendor, to previous periods and to budget considering industry trends Compare the number of weeks of inventory in distribution channels with prior periods Targeted testing of transactions / CAATs Compare daily recorded revenues for periods shortly before and after period end Compare sales credits for returns subsequent to period end with sales credits during the period Compare weekly and daily sales for selected periods near quarter or year end by location, product line and major vendor with sales of the preceding and prior year periods Compare revenue trends by salesperson for indications of potential revenue overstatement Slide 43

Anti-Fraud Framework The Role of IT IT Incident Response and Remediation Investigate instances of fraud Leverage system based resources where available Enhance controls based upon a root analysis Slide 44

Anti-Fraud Framework The Role of IT Forensic Investigation Whether to investigate Assembling the investigative team Legal, audit & business implications Slide 45

Key Take-Aways Slide 46

Fraud Risks IT Controls Slide 47

Questions??? Today s Presenter David Eikel Senior Manager Armanino McKenna (925) 790-2600 x7097 (650) 740-3868 (cell) Slide 48