Fraud Awareness Training



Similar documents
Sharon Kurek, CPA, CFE Director of Internal Audit

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

September 28, Audit s Role in Governance, Risk Management and Internal Control

716 West Ave Austin, TX USA

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

Office of the Inspector General

Fraud Awareness and Prevention Program Report

RED FLAGS OF FRAUD MAY 13, 2014 IIA AUSTIN CHAPTER

Steven Boyer Vice-President, Gallagher Bassett Services Inc.

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer

Employee Embezzlement and Fraud. Defending Against Insider Threats

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

Policy-Standard heading. Fraud and Corruption Policy

Making Your Fraud Vision 20 / 20. Thomas R. Strause, CIA, CFE, CBA, CISA, CFSA, CICA Partner FOS tstrause@fosaudit.

Fraud Prevention: The Prevention and Detection of Fraud Begins with You

Assessment for Establishing a Whistleblower Hotline:

IPPF Practice Guide. Internal Auditing and Fraud

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE 2012 GLOBAL FRAUD STUDY

Red Flags for Fraud. Thomas P. DiNapoli. Steven J. Hancox Deputy Comptroller Division of Local Government and School Accountability

Fraud: Real Stories, Real People, Real Impact

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

How To Prevent Fraud On A Credit Card

Mark Barwick Reinsurance Large Commercial Programme Director, ACORD

a. employees Company; or

Fraud Prevention Policy

INTRODUCTION TO FRAUD EXAMINATION

GLOBAL PORTS INVESTMENTS PLC

FRAUD RISK ASSESSMENT

Fraud and internal controls, Part 3: Internal fraud schemes

Procurement Fraud Identification & Role of Data Mining

How To Handle A Fraud At Psc

Performing Fraud Risk Assessments

Fraud Risk Management Procedures

Accounts Payable Best Practices

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITY TO CONSIDER FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

Financial Services Group

Fraud Control Theory

Introduction to Fraud Examination. World Headquarters the gregor building 716 West Ave Austin, TX USA

FRAUD PREVENTION STRATEGIES FOR HEALTH CARE A FORENSIC ACCOUNTANT S PERSPECTIVE

ANTI-CORRUPTION POLICY AND PROCEDURES

FRAUD RISK IN PUBLIC PROCUREMENT NATIONAL PUBLIC ENTITIES RISK MANAGEMENT FORUM

1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE

by: Scott Baranowski, CIA

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

Preventing Fraud and Abuse of Public Funds: Local Governments Need to Do Better

Riverside Community College District Policy No Human Resources

KEYS TO AN EFFECTIVE DIRECTOR CORPORATE COMPLIANCE AND INTERNAL AUDIT MULTICARE HEALTH SYSTEM TACOMA, WA

Fraud Prevention Training

Standards of. Conduct. Important Phone Number for Reporting Violations

OIG Hotline. Overview Examples of Allegations That Should Be Reported to the OIG Hotline Guidelines for Reporting Fraud...

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities. ONECare by Care1st Health Plan Arizona, Inc. (HMO) Revised: 10/2009

Fraud, Waste and Abuse Training

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Fiscal Policies and Procedures Fraud, Waste & Abuse

Fraud Policy FEBRUARY 2014

AGA Kansas City Chapter Data Analytics & Continuous Monitoring

Contract and Procurement Fraud. Vendor Management

SPG 223 Fraud Risk Management. June 2015

Centre for Corporate Governance. Sample listing of fraud schemes

Pioneer Power Solutions, Inc. Code of Business Conduct and Ethics

REPORT TO THE NATIONS ON OCCUPATIONAL FRAUD AND ABUSE

Sobel & Co. s Nonprofit and Social Services Group presents. Your Organization is Vulnerable: The Facts About Nonprofits and Fraud

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

ACCOUNTING RECORDS: HOW THEY ARE USED TO CONCEAL FRAUD. ROSANNE TERHART, CFE, CA Senior Manager BDO Canada LLP Vancouver, British Columbia Canada

Avoiding Theft in Your Nonprofit Ohio Attorney General Mike DeWine

Fraud and the Government Internal Auditor

ANTI-FRAUD POLICY Adopted August 13, 2015

7/22/2014. From Treadway To the Cube ( ) So, Who is COSO? What Does COSO Do?

False Claims Act Policy Effective Date 01/01/2007 Compliance Manual

SCHOOLS FRAUD RESPONSE PLAN

ELEPHANT TALK COMMUNICATIONS CORP. FOREIGN CORRUPT PRACTICES ACT COMPLIANCE POLICY

Fraud Waste and Abuse Training First Tier, Downstream and Related Entities

BRIBERY AND CORRUPTION

Administrative Policy and Procedure Manual. Code of Conduct Effective Date: 1/2005 Scope: Organizationwide Page 1 of 9

Numerous missing invoices, receipts, and purchase justifications.

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY

Platform Specialty Products Corporation Foreign Corrupt Practices Act/Anti-Corruption Policy

Transcription:

UT System Administration General Compliance Training Fall 2014 This training will take approximately 20 minutes to complete

Objectives What is occupational fraud Common myths about fraud Conditions for fraud Behavioral red flags/warning signs of fraud How frauds are detected What your responsibilities are What to do if you suspect fraud 2

What is occupational fraud? Occupational fraud is defined as the use of one s occupation for personal enrichment through the deliberate misuse or misapplication of the employing organization s resources or assets. 3

Cost of Fraud? The Association of Certified Fraud Examiners (ACFE) 2014 Report to the Nations on Occupational Fraud and Abuse (Report), used as a resource for this training, was based on a study of 1,483 cases of occupational fraud. According to the ACFE 2014 Report, organizations lose 5% of their annual revenues to fraud. When applied to the estimated 2013 Gross World Product, this would translate to an estimated $3.7 trillion in fraud losses. 4

Types of Fraud The ACFE has broken down the schemes for committing occupational fraud into three primary categories. Asset Misappropriation 85% Corruption 37% Financial Statement Fraud 9% Amounts do not add to 100% since some cases involved more than one type of fraud. 5

Asset Misappropriation Asset Misappropriation schemes are frauds in which the perpetrator steals or misuses an organization s resources. Examples include: Theft Employee steals or misuses cash or non-cash assets (e.g. supplies, equipment) of the organization Payroll fraud Employee claims overtime for hours not worked False Expense Reimbursements Employee files fraudulent travel expense report claiming nonexistent meals, etc. False invoicing Employee creates a fictitious company and bills the employer for nonexistent goods or services 6

Corruption Corruption refers to schemes in which fraudsters use their influence in business transactions to obtain a benefit for themselves or someone else contrary to their duty to their employer. Bribes Accepting illegal gratuities Engaging in conflicts of interest Extorting illegal payments from third parties 7

Financial Statement Fraud Financial Statement Fraud involves the intentional misstatement or omission of material information from the organization s financial reports which may include Financial statements Grants Applications submitted which include financial information 8

Common Myths About Fraud We don t handle cash there is nothing to steal Audits will detect all frauds All of my employees are trustworthy Most people won t commit fraud Prosecuting fraud deters others Most fraud goes undetected Fraud is not material to the business 9

Conditions That Facilitate Fraud Poor or weak internal control system (i.e., duties not properly segregated, assets not properly safeguarded) Lack of monitoring of internal controls Independent reconciliations are not performed or unreconciled items are not investigated Documentation is not produced or kept or the documentation is not an original source document Transactions are executed without proper authorization Employee relationship with a particular vendor is close and long term 10

Conditions That Facilitate Fraud (continued) One employee does it all or an employee won t take a vacation Management or others can override procedures without documentation Poor management supervision/oversight High management or employee turnover Low employee morale Write-off of inventory with no attempt to determine its whereabouts Frequent use of exclusive acquisition procurement contracts Non-enforcement of the organization s ethics code 11

Behavioral Red Flags Fraudsters often display certain behaviors or characteristics, known as red flags, that may serve as warning signs to coworkers, superiors, and other daily contacts. The presence of these symptoms does not in and of itself signify that a fraud is occurring or will occur in the future. 12

Behavioral Red Flags (continued) Some red flags present during fraud schemes listed in the order of frequency: Living beyond means Financial difficulties Wheeler-dealer attitude Control issues, unwillingness to share duties Divorce/family problems Unusually close association with vendor Irritability, suspiciousness, or defensiveness 13

Behavioral Red Flags (continued) Addiction problems Past legal problems Past employment related problems Complaining about inadequate pay Refusal to take vacations Excessive pressure from within the organization Instability in life circumstances Excessive family/peer pressure for success Complaining about lack of authority 14

Scenario 1 Joe Smith has authority to approve vendors and amounts paid to them on contracts for goods and services. Joe was approached by a dishonest vendor about an arrangement whereby the vendor would send him phony or inflated invoices for materials or labor and Joe would approve the payment and then split the loot with the vendor. What type of fraud is this? 15

Scenario 1 Answer: Corruption Kickback Scheme Kickbacks are undisclosed payments made by vendors to employees of purchasing companies. The purpose of a kickback is usually to enlist the corrupt employee in an over-billing plot. Analyzing trends in spending and understanding variances and irregularities can help detect overpayments. Corruption schemes are most often exposed through a tip. 16

Scenario 2 Sue Williams was approved to attend a two-day conference in San Antonio. Fees for the conference, including the hotel accommodations, were paid in advance. Meals were included as part of the conference fees. Sue choose not to participate in the second day of the conference, but instead took a taxi to the outdoor market for a day of shopping. When Sue submitted her expense report, she requested reimbursement for the related taxi fare and meals. What type of fraud is this? 17

Scenario 2 Answer: Asset Misappropriation Expense Reimbursement Scheme All expense reports should be carefully reviewed and routine questions asked prior to authorizing reimbursement. In this case, inquiries about the conference would be prudent. Expense reports should be accompanied by original receipts verifying that adequate evidence of travel and related expenses occurred. 18

Scenario 3 John Jones had been struggling to make his mortgage and car payments since his wife lost her job. He had authority to approve invoices for payment. He used his management authority to establish a shell vendor account, JJ Enterprises, which never provided goods or services of any kind. John used a mail drop address for the vendor account where he could receive the checks for his own personal gain. What type of fraud is this? 19

Scenario 3 Answer: Asset Misappropriation Billing Scheme Billing fraud is often perpetrated by deceitful employees who have the ability to approve new vendor accounts. The fraudster then directs falsified payments to that vendor account that he or she controls. Be alert to suspicious patterns of vendor payments, including those that are just under the radar in terms of required approvals, reporting, amounts, or other procedures. Strict controls over vendor account approvals might have prevented this fraud. 20

How Are Frauds Detected? Initial Detection of Occupational Fraud Tip 42.2% Management Review Internal Audit 14.1% 16.0% Detection Method By Accident Account Reconciliation Document Examination External Audit Surveillance/Monitoring Notified by Law Enforcement IT Controls Confession Other 6.8% 6.6% 4.2% 3.0% 2.6% 2.2% 1.1% 0.8% 0.5% 0.0% 5.0% 10.0% 15.0% 20.0% 25.0% 30.0% 35.0% 40.0% 45.0% Percent of Cases 21

What are your Responsibilities? Management is responsible for establishing and maintaining an effective control system according to UTS118 Statement of Operating Policy Pertaining to Dishonest or Fraudulent Activities. A well-designed internal control system should not be conducive to fraud. The minimization of fraud, waste, and abuse is every employee s responsibility. 22

Suspected Fraud What are your Responsibilities? UTS131 Protection from Retaliation for Reporting Suspected Wrongdoing (www.utsystem.edu/policy/policies/uts131.html) states that all UT System employees are required to report: Illegal or fraudulent activity; Financial misstatements, or accounting or auditing irregularities; Conflicts of interests, or dishonest or unethical conduct; Violations of the institution s code of conduct; and Violations of other laws, rules, or regulations. Under UTS131, UT System will not tolerate any form of retaliation against individuals providing information concerning fraud or suspected fraud. 23

Suspected Fraud What are your Responsibilities? Do not question or confront the person Do not investigate the matter on your own Work within your management chain of command Follow the fraud policy UTS118 Statement of Operating Policy Pertaining to Dishonest or Fraudulent Activities (www.utsystem.edu/policy/policies/uts118.html) 24

Suspected Fraud What are your Responsibilities? How to report fraud? Talk with your supervisor Contact the Chief Audit Executive at 512-499-4390 Contact the Director of Police at 512-499-4680 Contact the Systemwide Compliance Officer at 512-499-4304 Call the Compliance Hotline at 1-877-217-2426, 24- hours a day, 365 days a year 25

Where to Find out More UTS118 Statement of Operating Policy Pertaining to Dishonest or Fraudulent Activities www.utsystem.edu/policy/policies/uts118.html UTS131 Protection from Retaliation for Reporting Suspected Wrongdoing www.utsystem.edu/policy/policies/uts131.html Standards of Conduct Guide www.utsystem.edu/systemcompliance/soccombined.pdf Ask your supervisor Ask the Chief Audit Executive 26

Congratulations. You have completed training on fraud awareness. Close the browser window to exit UT System Administration General Compliance Training