Module # 3 Physical Controls to Deter Employee Theft and Fraud



Similar documents
Fraud Control Theory

Internal Controls and Fraud Detection & Prevention. Harold Monk and Jennifer Christensen

Fraud Risk Management Program Review

Fraud Prevention Policy

Internal Control Requirements December 11, 2002

Fraud Prevention and Deterrence

Internal Controls for Small Organizations. Jen Parker, CPA Director of Accounting & Finance US Youth Soccer

Internal Controls, Fraud Detection and ERP

Centre for Corporate Governance. Sample listing of fraud schemes

Fraud Awareness Training

Basic Concepts of Accounting Subsidiary Subsidiary Special Special Inform Infor a m tion Ledgers Ledger Journals Jour Systems

Types of Fraud and Recent Cases. Developing an Effective Anti-fraud Program from the Top Down

Fraud Awareness and Prevention Program Report

INTERNAL CONTROL QUESTIONNAIRE OFFICE OF INTERNAL AUDIT UNIVERSITY OF THE VIRGIN ISLANDS

RISK ASSESSMENT CHECKLIST

LGMA Qld Governance and Corporate Planning Village Forum

Fraud Risk Management Procedures

Antifraud program and controls assessment grid*

Consideration of Fraud in a Financial Statement Audit

Fraud and internal controls, Part 3: Internal fraud schemes

NONPROFIT FINANCIAL MANAGEMENT SELF ASSESSMENT TOOL

1. Compliance with Laws, Rules and Regulations

Office of the Inspector General

Fraud: Real Stories, Real People, Real Impact

SEKO Logistics Anti-Corruption and Foreign Corrupt Practices Act Policy

GLOBAL PORTS INVESTMENTS PLC

YMCA of High Point Whistleblower Policy and Procedure

Fundamentals of Computer and Internet Fraud WORLD HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

Table of Contents: Chapter 2 Internal Control

Tips to Prevent and Detect Workplace Fraud

Introductions, Course Outline, and Other Administration Issues. Ed Ferrara, MSIA, CISSP Copyright 2015 Edward S.

7/22/2014. From Treadway To the Cube ( ) So, Who is COSO? What Does COSO Do?

How to set up a people based. accounting system that makes your. small business work for you. Thomas G. Post. Certified Public Accountant

MEAD JOHNSON NUTRITION COMPANY CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS

CODE OF ETHICS FOR SENIOR FINANCIAL OFFICERS

ANTI-FRAUD POLICY Adopted August 13, 2015

Fraud Policy FEBRUARY 2014

ป งบประมาณ พ.ศ.๒๕๕๘ ( ๑ ต ลาคม ๒๕๕๗ ถ ง 30 ก นยายน ๒๕๕๘ ) สร ปผลปร มาณงานพ สด การจ ดซ อ/จ าง/เช า ในรอบเด อนพฤศจ กายน ๒๕๕๗ ส าน กงานท ด นจ งหว ดเช

Northern Grampians Shire Council FRAUD CONTROL PLAN

Fraud and Role of Information Technology. September 2008

September 28, Audit s Role in Governance, Risk Management and Internal Control

SAMPLE FRAMEWORK FOR A FRAUD CONTROL POLICY

Attachment 14 Financial Monitoring Tool November 2008

Expenditures Internal Audit Report

Understanding Business Fraud Presenter Paul A. Rodrigues, CPA, MST, CFE, CFF, Principal Presenter David G Friedman, CPA, CFF, CFE, Partner

Connecting the dots: IT to Business

Accounts Receivable. Features. Parameterized. Multiple Divisions

716 West Ave Austin, TX USA

How To Handle A Fraud At Psc

MEMORANDUM INTERNAL CONTROL REQUIREMENTS FOR NON-PROFITS

POLICY SUBJECT: EFFECTIVE DATE: 5/31/2013. To be reviewed at least annually by the Ethics & Compliance Committee COMPLIANCE PLAN OVERVIEW

THE EXPENDITURE CYCLE Part I

TECK RESOURCES LIMITED AUDIT COMMITTEE CHARTER

Chapter 15 Auditing the Expenditure Cycle

Presented by: Donald F. Conway, CPA Mercadien, P.C., Certified Public Accountants. Forensic Accounting, Political Corruption & White Collar Offenses

The auditors responsibility to consider fraud in an audit of financial statements

Internal Controls Best Practices

ACC207 Computerized Accounting Administration Outline

MEMORANDUM. Municipal Officials. From: Karen Horn, Director, Public Policy and Advocacy; and Abby Friedman, Director, Municipal Assistance Center

Does Fraud Matter? ASIS Middle East Security Conference and Exhibition Dubai, February 16, Torsten Wolf, CPP Head of Group Security Operations

INTERNATIONAL STANDARD ON AUDITING 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS CONTENTS

A424: Chapter 15 Audit Sampling for Tests of Controls and Substantive Tests of Transactions

Good Internal Controls for Small Businesses

INTERNATIONAL STANDARD ON AUDITING (UK AND IRELAND) 240 THE AUDITOR S RESPONSIBILITIES RELATING TO FRAUD IN AN AUDIT OF FINANCIAL STATEMENTS

Module # 2 Management/Key Employee Assessment

Modalities for Forensic Review of Computer Related Frauds

Detecting, Preventing, and Reporting FRAUD

Is There Anyway to Prevent Fraud? Bill Gady, CGA CPA Partner

Standards of. Conduct. Important Phone Number for Reporting Violations

The Impact of Information Technology on the Audit Process

How To Prevent Fraud On A Credit Card

Top 10 Ways Employees Steal From Their Employers

PROCEDURES FOR REPORTING BY EMPLOYEES OF COMPLAINTS AND CONCERNS REGARDING QUESTIONABLE ACTS

JOB READY ASSESSMENT BLUEPRINT ACCOUNTING-BASIC - PILOT. Test Code: 4100 Version: 01

Fraud Prevention, Detection and Response. Dean Bunch, Ernst & Young Fraud Investigation & Dispute Services

5 Important Controls to Mitigate Employee Fraud

Paper F8. Audit and Assurance. Thursday 4 December Fundamentals Level Skills Module. The Association of Chartered Certified Accountants

CORPORATE POLICY & PROCEDURE MANUAL. CHAPTER: General Administration. TITLE: Code of Business Conduct and Ethics

TITLE: Fraud Prevention and Detection Program IDENTIFIER: S-FW-LD-1008 APPROVED: Executive Cabinet (Pending)

How To Use A Corporate Credit Card

SCHOOLS FRAUD RESPONSE PLAN

COMPLIANCE PROGRAM GUIDANCE FOR MEDICARE FEE-FOR-SERVICE CONTRACTORS

Diploma in Forensic Accounting (Level 4) Course Structure & Contents

1/17/2013 FRAUD RISK MANAGEMENT PROGRAM SESSION OBJECTIVE AND OUTLINE

Transcription:

Module # 3 Physical Controls to Deter Employee Theft and Fraud The physical controls assessment questions are designed to assess the probability of a fraudulent event occurring within the organization based on: Physical controls in place to control access to accounting records and information Physical controls in place to protect the assets of the organization Questionnaire Key 1. Does the organization conduct pre-employment background checks to identify previous dishonest or unethical behavior? Before offering employment to an applicant, a company should conduct a preemployment background check. 2. Are there policies and procedures that address dishonest or unethical behavior? The company should document and implement policies and procedures that describe (1) unethical conduct, (2) punishment for engaging in unethical conduct, and (3) how to report unethical conduct. 3. Does management support the ethics and anti-fraud policies? Senior management sets the tone for ethical conduct throughout the organization. The tone should signal that fraud will not be tolerated. 4. Does the organization educate employees about the importance of ethics and anti-fraud programs? All employees should receive training on the ethics and anti-fraud policies of the company. The employees should sign an acknowledgment that they have received the training and understand the policies. 5. Does the organization provide an anonymous way to report suspected violations of the ethics and anti-fraud policies? Organizations should provide a system for anonymous reporting of suspected violations of the ethics and anti-fraud policies. 1

6. Does the organization restrict access to areas containing sensitive documents (such as invoices, receipts, journals, ledgers, and checks) and maintain a system for providing an audit trail of access? Access to areas containing sensitive documents should be restricted to those individuals who need the information to carry out their jobs. Also, an audit trail of access should be maintained. 7. Does the organization restrict access to computer systems with sensitive documents (such as accounting software, inventory, and payroll) and create a system to provide an audit trail of access? Access to computer systems should be restricted to those individuals who need the information to carry out their jobs. Also, an audit trail of access should be maintained. 8. Does the organization restrict access to areas with high value assets, such as shipping, receiving, storerooms, and cash? Organizations should restrict access to areas with high value assets and should maintain a log of persons accessing such areas. 9. Does the organization use CCTV and recording equipment to monitor entries, exits, areas with sensitive or high value assets, and sales areas? Entries, exits, areas with sensitive or high value assets, and sales areas can be monitored using CCTV and recording equipment. 10. Does the organization conduct random, unannounced audits of inventory, cash, expense, purchasing, billing, and other accounts by internal or external auditors? Random, unannounced audits help prevent fraud perpetrators from having time to alter, destroy, and misplace records and other evidence of their offenses. 11. Does the organization use professional loss prevention or security personnel to monitor physical controls? Professional loss prevention or security personnel can be used to monitor physical controls. 12. Does the organization promptly investigate incidents of suspected or reported fraud? Promptly investigating incidents of suspected or reported fraud can minimize losses. 2

Does the organization conduct pre-employment background checks to identify previous dishonest or unethical behavior? Are there policies and procedures that address dishonest or unethical behavior? Does management support the ethics and anti-fraud policies? Does the organization educate employees about the importance of ethics and anti-fraud programs? Does the organization provide an anonymous way to report suspected violations of the ethics and anti-fraud policies? 3

Does the organization restrict access to areas containing sensitive documents (such as invoices, receipts, journals, ledgers, and checks) and maintain a system for providing an audit trail of access? Does the organization restrict access to computer systems with sensitive documents (such as accounting software, inventory, and payroll) and create a system to provide an audit trail of access? Does the organization restrict access to areas with high value assets, such as shipping, receiving, storerooms, and cash? Does the organization use CCTV and recording equipment to monitor entries, exits, areas with sensitive or high value assets, and sales areas? Does the organization conduct random, unannounced audits of inventory, cash, expense, purchasing, billing, and other accounts by internal or external auditors? 4

Does the organization use professional loss prevention or security personnel to monitor physical controls? Does the organization promptly investigate incidents of suspected or reported fraud? 5