FRAUD. Detection and Deterrence Skills for Auditors. The Institute of Internal Auditors New York City Chapter March 16, 2018

Size: px
Start display at page:

Download "FRAUD. Detection and Deterrence Skills for Auditors. The Institute of Internal Auditors New York City Chapter March 16, 2018"

Transcription

1 FRAUD Detection and Deterrence Skills for Auditors The Institute of Internal Auditors New York City Chapter March 16, 2018 JOHN J.HALL

2 Hall Consulting, Incorporated PO Box 6263 Denver, CO Office: (970) Mobile: (312) ABOUT YOUR SPEAKER John J. Hall, CPA ø John J. Hall, CPA is the founder and President of Hall Consulting, Inc., and the author of the award-winning book Do What You Can! Simple Steps Extraordinary Results. He has been a business consultant, results coach and speaker for most of his career. Through live skills training programs, conference keynote presentations, business and personal results coaching, and business consulting engagements, John helps program participants and client team members: Identify and improve areas of exposure to business risk, wrongdoing, and fraud Improve organizational and personal performance Enhance the effectiveness of business processes and individual behavior Improve interpersonal and communications skills Speaking, training, coaching and consulting areas include: Fraud Risk Management: prevention, deterrence, early detection and effective incident response Business keynote and conference presentations Communication and interpersonal behavior skills programs, including: ü ü ü ü ü ü Establishing business rapport and trust Effective interviewing and listening Speaking and presenting Selling ideas and influencing others to take action Leadership, collaboration and influence Consulting skills for professionals Intensive One-to-One and small group performance and results coaching Board and senior management anti-fraud consulting Audits of costs incurred in large construction projects and other contractor services Mr. Hall has over 40 years of experience as a professional speaker, consultant, corporate executive, and business owner. In addition to operating his speaking, training and business consulting firm since 1990, he has worked in senior leadership positions in large corporations and international public accounting and consulting firms. John is a Certified Public Accountant (Pennsylvania) and Certified Board Advisor. He is an active member of the National Speakers Association, the American Institute of CPAs, and the Institute of Internal Auditors. Meet John at

3 FRAUD RISK MANAGEMENT FRAMEWORK 1. FRAUD DETERRENCE AND PREVENTION 1) Visible and vocal executive leadership 2) Active fraud risk brainstorming 3) Policy on Fraud Responsibilities 4) Anti-fraud controls 5) Anti-fraud behaviors 6) Anti-fraud How To skills training 2. EARLY FRAUD DETECTION 1) Detection-based audit steps 2) Detection-based internal controls and behaviors 3) Clear statement of detection responsibilities and accountability 4) Effective hotlines 5) Other tip sources 6) Monitoring for red flags and other fraud indicators 7) Special focus on third party relationships 3. EFFECTIVE FRAUD HANDLING 1) Fraud response is in place and ready to go 2) Employees know what happens when the alarm sounds 3) Investigation 4) Loss recovery 5) Control weaknesses are fixed 6) Coordination with law enforcement and prosecutors 7) Publicity issues 8) Human resources issues 9) Employee morale issues Organizations and their auditors must be prepared to address fraud risks at all three levels. Page 1

4 STEP 1. VISIBLE AND VOCAL EXECUTIVE LEADERSHIP 1. Nothing meaningful happens and is sustained without visible, vocal CEO involvement a) The Chief Executive must personally lead the charge b) Leaders at all levels must talk about it explicitly c) Leaders must make everyone feel safe to report suspicions d) The CEO may appoint a trusted leader to administer the anti-fraud campaign, but they must insist on accountability for results e) The CEO should invest personally in employee awareness and training 2. For years the phrase tone at the top has been used to focus on the statements, business practices and personal behavior of executives and other senior management members. But a leader includes anyone we look to for an indication of proper behavior. That includes everyone from first level supervisors in the field right up to the Board. The tone at the top must match the tone in the middle and the tone at the bottom. 3. Organizations that are serious about managing their fraud risks require outstanding personal example. And counsel all who don t act properly. 4. Employees, vendors, contractors and others all need to know what is allowed in daily behavior. And just as important, what is considered misconduct. 5. Employees and managers must know the rules for reporting financial and other results. 6. Vendors, contractors and other third parties must know your restrictions on gifts and entertainment and penalties for violations. Make your Code of Conduct part of any agreements with third parties. John@JohnHallSpeaker.com Page 2

5 ANTI-FRAUD EXPECTATIONS The list below should give you suggestions of topics or themes to include in leading a discussion about fraud expectations with your staff or team. Don't just read off the list instead, pick five or six items that most relate to your own beliefs and tailor comments to your unique environment and culture. Be sure to: 1. Frame the discussion to the questions those listening to you will likely have 2. Stress the importance of a balanced message tie your request for help to the listeners normal pride in their work 3. Be explicit. Don't beat around the bush. Tell them what you expect and what you need them to do as a result. 4. Use a positive tone. Make it a call to arms that starts with, I need your help to fight this problem. 5. Include examples of what could go wrong in your area, including what it would look like in reports, variances, complaints and other indicators of a problem It is expected that every manager and employee will: 1. Know the fraud related exposures in their areas of responsibility, for example 2. Know what it would look like if it happened. For example 3. Use best-faith efforts to minimize the chance of fraud on their watch. Examples include 4. Make sure the transactions they personally approve are not fraudulent. Here s an example of what I mean 5. Personally monitor for those frauds that only they are in a position to detect. For example 6. Question and challenge the unusual. Here s an example of what I mean 7. Set an example of honest and ethical behavior by personal example and by not tolerating dishonest or unethical behavior in others. Here are a few examples of how to do that 8. Strive to prevent fraud by minimizing the exposures and reducing the opportunities and temptation. For example 9. Immediately refer suspected wrongdoing to Internal Audit or Security for investigation. Here s an example of what I mean John@JohnHallSpeaker.com Page 3

6 STEP 2. ACTIVE FRAUD RISK BRAINSTORMING Fraud risk brainstorming myths: 1) Once and done covers it 2) One group can do this alone 3) Cost isn t justified 4) We already know our risks 5) We ll scare people Three Steps: 1) Staff-level brainstorming 2) Best-guess of probability and significance 3) Address identified exposures in a meaningful way Three Question Script: 1) How could someone exploit weaknesses in our controls and daily behaviors? 2) How could someone override or circumvent our controls? 3) How could someone conceal their wrongful actions? The Secret Sauce: Begin (plan) with the PRESUMPTION that a fraud event has already occurred Position by position, department by department, ask the question What could go wrong? Create a robust inventory of fraud risks. Use this list to provide training for new employees and supervisors. Develop offsetting prevention and early detection procedures for each risk identified. Publicize the effort and the results. Create awareness in honest employees, and fear in those tempted to commit wrongdoing. Few organizations have taken the time to develop a complete list of their existing fraud loss areas. Begin by listing areas where losses have occurred in the past. Then research these areas and assign ranges of probable current loss levels. Normally this list will total no less than one percent of revenue. John@JohnHallSpeaker.com Page 4

7 STEP 3. POLICY ON FRAUD RESPONSIBILITIES Every manager is responsible for: 1. knowing the exposures to wrongdoing and fraud in their areas 2. doing their best to prevent or deter incidents, 3. promptly detecting suspicious transactions and events 4. immediately reporting suspicions to those responsible for follow-up Policies on Fraud Responsibilities, Ethics Statements, Codes of Conduct and other behavior policies should require reporting. Periodic sign-off is a good way to track awareness and minimize I didn t know situations. Add a sign-off where managers and employees acknowledge that they are not aware of violations by others. Essential Content: 1. Positive we need your help / call to arms message 2. State manager and staff responsibilities with precision and clarity 3. Responsibility for exposure awareness 4. Procedures and behaviors to prevent 5. Procedures and behaviors to detect promptly 6. What to do / what not to do 7. Emphasis on SUSTECTED acts 8. Periodic certification 9. Balance is critical Make it Easy to Report: 1. Make it as positive as possible 2. Fraud Hotline in place, understood and trusted 3. Tell everyone exactly how it works, who answers calls, and what they will say John@JohnHallSpeaker.com Page 5

8 STEP 4. ANTI-FRAUD CONTROLS Fraud exposures are identified and specific control procedures are developed, implemented and maintained to both prevent these events from happening and to detect them should they occur. Control Procedures Include: 1. Leadership words and deeds 2. Culture of quality 3. Finance and accounting knowledge wherever needed throughout the organization for effective control 4. Meaningful exposure assessment 5. Limited access 6. Living policies, procedures and systems 7. Responsibility and accountability for transaction initiation, review and approval 8. Effective screening and where appropriate re-screening Never forget: Control procedures alone do not prevent fraud HI III I BEHAVIORS IV II LOW PROCEDURES HI John@JohnHallSpeaker.com Page 6

9 10 REASONS CONTROLS BREAK DOWN: (How many have you seen in your work in the last six months?) 1. Blind trust 2. Willful blindness Ignoring control implications of policies, procedures and reports Ignoring behavioral indicators of problems 3. Not having information needed to assure transactions are proper 4. Culture of not questioning the strange, odd and curious 5. Situational incompetence 6. The process mentality 7. Not enough time to do the control procedures 8. Not enforcing documentation requirements 9. Intentional override 10. Acceptance of the situation (fear, immunity, no longer engaged) Page 7

10 STEP 5. ANTI-FRAUD BEHAVIORS Auditors and employees look for fraud symptoms in information they see each day. Managers and employees are aware of and monitor for fraud indicators in documents they handle and approve, in operations and exception reports, and in behavior. Auditors brainstorm fraud risks on every project, link fraud risks to specific audit procedures, and carry out fraud detection steps during their testing and interviews. Anti-Fraud Behavior Foundation: 1. Competence 2. Integrity 3. Interest 4. Time 5. Real oversight and analysis 6. Coaching Four Daily Anti-Fraud Controls Behaviors: 1. Look 2. Ask 3. Doubt 4. Resolve When YOU See Something YOU Say Something Page 8

11 STEP 6. ANTI-FRAUD HOW-TO SKILLS TRAINING Sponsor or conduct fraud awareness and skills training programs addressing what employees and auditors need to know to prevent, detect and handle fraud. Most employees have never been taught the skills needed to be effective in this area. This skills gap allows fraud to occur and go undetected. Who do we train? 1) All new hires 2) All new supervisors 3) Executives and Board members 4) Relevant third parties What skills are needed? 1) General knowledge of fraud risks 2) What can happen in their areas 3) What it looks like in documents, reports and behaviors they see 4) Suggestions on prevention 5) Suggestions on prompt detection when prevention fails How do we deliver training? 1) Group-live 2) Technology-based Teleseminars Webinars Video 3) 1 on 1 coaching by supervisors 4) 1 on 1 coaching by auditors 5) Written John@JohnHallSpeaker.com Page 9

12 BEFORE APPROVING INVOICES FROM VENDORS AND CONTRACTORS Good Questions to Ask! Each day, managers review and approve thousands of invoices, contractor statements, time sheets, expense reimbursements, purchasing card details, and other documents that cause cash to be disbursed. All too often, that approval becomes a rubber stamp with little active thought about what the approval step really means. Signatures without thought increase the likelihood of mistakes and make it easy for those who are trying to fool us. Managers are encouraged to answer these basic questions before approving invoices and other payment documents. All address the general question of: How do I know? 1. How well do I know this vendor or contractor? Do I have first hand knowledge that they even exist! 2. Do I know that they actually provided the goods or services identified in the invoice or other billing statement? 3. Do I know that they are using the correct amounts for price (including unit prices used), sales tax, freight, and other variables that make up the amount invoiced? 4. On what basis do I know that the prices are reasonable in the first place? What standard have I used in determining that the price charged is fair? 5. How do I know that the quantities make sense? On what basis have we agreed to purchase the stated quantities? 6. How do I know that the invoice and other documents are mathematically correct? 7. Do I know that this invoice has not already been paid? John@JohnHallSpeaker.com Page 10

13 AUDIT / INVESTIGATION FLOW DIAGRAM Audit Tip Exception Pattern Review Of Records Interviews Case File Interrogation Law Enforcement Insurance Company Bonding Claim Control Weakness Audit Report John@JohnHallSpeaker.com Page 11

14 THREE-STEP FRAUD DETECTION for EVERY PROJECT I. THINK LIKE A THIEF BRAINSTORMING Look at identified weaknesses and other opportunities from the perspective of how they could be exploited. Documentation should include specific fraud risks identified and a clear bridge to specific audit steps, controls and behaviors targeted at detection of related fraud incidents. II. USE DISCOVERY TECHNIQUES AGGRESSIVELY a) Discovery or attribute testing. These tests have as their purpose surfacing the visible signs of wrongdoing. Such testing is directed at either electronic or manual records. Electronic data analysis tools make the efficient search of large populations possible. b) Detection-Focused Interviews. Targeted interviewing techniques can be an efficient method for surfacing hidden information. They are used to get the human information not available in records. In situations where the signs of fraud might not be in the records, the interview may be the only method available to surface needed information. c) Monitoring for fraud indicators. Examples include: Internal information used by management to find problems in operations Reconciliations, closing entries, adjustments, override transactions and other available information showing a deviation from normal results Recurring software-based inquiries III. DETERMINE THE CAUSE OF ALL FRAUD INDICATORS SURFACED All indicators surfaced should be investigated as to their cause. Follow up on fraud indicators, symptoms and red flags may lead to the discovery of wrongdoing. It also may surface other important non-fraud issues. Either result justifies following all observed indicators through to the determination of their Root Cause. John@JohnHallSpeaker.com Page 12

15 1. Standard reconciliations 2. Top performance 3. Poor performance 4. Timing differences MONITORING FOR FRAUD SYMPTOMS 5. Suspense accounts and clearing accounts 6. Complaints 7. Overtime by employee 8. Top travelers 9. Top earners 10. Consulting and other third party services billings 11. Adjustments and overrides: sales prices receivable accounts cash accounts inventory 12. Closing entries 13. Failures 14. Common names or addresses for refunds or credits 15. Goods purchased in excess of needs / slow turnover 16. Duplicate payments 17. Regular meetings with key executives 18. Other ideas from your experience: John@JohnHallSpeaker.com Page 13

16 OTHER METHODS OF DISCOVERY 1. If you had unlimited access to records and people, how would you look for fraud? List two ideas. Be specific. 2. If you could create one new data analysis test to look for wrongdoing, what would it be? List the files needed and the specific red flags you would seek to uncover. 3. Some fraud cases surface as a result of tips from informants. What can we do to encourage concerned employees to come forward? What about vendors, customers and other third parties? 4. Auditors and examiners use confirmations for many purposes. Examples of confirmations aimed at fraud detection include: Change of address, mailed to prior address Payments, using a copy of both the front and back of the check Receivables already written off Late payments Refunds and credits List one other confirmation idea aimed at surfacing fraud indicators. 5. What else could you do to find misconduct, wrongdoing, theft or outright fraud on your projects? John@JohnHallSpeaker.com Page 14

17 MISAPPROPRIATION OF ASSETS CASH 1. Theft of cash from point of sale terminals, cash registers and similar devices 2. Petty cash Theft of cash on hand For reasons that should be obvious, organizations with large amounts of cash are very susceptible to theft. The actual theft of the cash -- the commission of the fraud -- is relatively simple. Similarly, there is no conversion step necessary. These schemes become complicated to the thief during the concealment stage. Common schemes involving the theft of cash on hand and the attempt to cover the theft in the records include the following: 1. Skimming Cash is skimmed before it enters the accounting system. 2. Substituting personal checks for cash The employee takes money from the cash register and substitutes a personal check. In that way, the cash drawer is always in balance. 3. Fictitious refunds or discounts Employees record a refund and remove cash as if a refund occurred. But no merchandise was returned or discount given. PURCHASING CARDS 1. Maintenance department administrative assistant $35,000 tool purchase and immediate resale Home Depot 2. Dallas Independent School District Dallas Morning News July 2, 2006 Secretary charges $383,788, has no receipts Former DISD Employee Pleads Guilty to Federal Charge John@JohnHallSpeaker.com Page 15

18 ACCOUNTS RECEIVABLE DIVERSION Most misappropriation related to accounts receivable involves diversion of payments received from customers and others. Schemes to commit fraud and convert the proceeds are fairly simple to perform: 1. Cash payments are simply removed 2. Non-cash payments on account are diverted o An employee opens a bank account in a name similar to the entity being defrauded. Customer payments are then deposited into this account and removed when they clear. o Customers are advised of an incorrect account for wire transfer payments What varies is how the fraud is concealed. Common techniques include: Lapping The payment from Customer A is diverted to the employee. To keep Customer A from complaining, payment from Customer B is applied to Customer A. Customer C s payment is applied to Customer B s account, and so on. Posting bogus credits to the account To conceal the fraud, the employee posts credit memos or other noncash reductions (for example, a bogus sales return or write-off) to the customer account from which the funds were diverted Altering internal copies of invoices The company s copy of the sales invoice is altered to report an amount lower than was actually billed to or collected from the customer. The excess payment is diverted. Other schemes involving receivables include: Diversion of payments on written off accounts many organizations do not monitor activity on accounts that have been written off. This creates the opportunity to divert the funds that were not expected. Freshening and kickback the fraudster makes arrangements with past due customers to help manage their accounts. Adjustments are made to make the account appear to be current (for example, by canceling older invoices and rebilling the transactions with current dates). This effectively gives the customer unlimited time to pay the bills and avoid late fees and interest charges. The employee receives a kickback or other incentive from the customers. John@JohnHallSpeaker.com Page 16

19 INVENTORY, EQUIPMENT and OTHER HARD ASSET THEFT Theft for personal use. More likely to occur when items are small in size but have a relatively high value to the employee or other consumer. For example, in general a notebook computer has more value to the thief than does the computer chip that drives that computer. Theft for resale. As theft is for resale, value to the thief is not based on their own ability to use the item taken, but is based on the ability to the thief to convert the stolen items to cash or other assets through resale. As such, high quantities of items stolen provide high conversion value and thus higher appeal to the thief. Common schemes include: 1. Receiving personnel removing goods right from the receiving docks before physical custody is perfected 2. Collusion with delivery personnel to arrange for goods to be dropped at an unauthorized location 3. Records direct that items purchased are to be delivered to a location where the thief can easily take control Theft of scrap and used assets. In many organizations, controls may be weak over scrap disposition as well as the retirement and disposition of other used assets. Creative thieves find ways to sell these items, and divert all or part of the proceeds. Examples include: 1. Setting up but not disclosing ownership of customer organizations or brokers who purchase or dispose of these items at a below market spot price 2. Purchasing used vehicles or equipment at less than fair value, and then immediately reselling these items to third parties at market value Note that losses can be significant, especially where the embezzler has the authority or other ability to inappropriately designate good inventory and other usable assets as scrap. John@JohnHallSpeaker.com Page 17

20 PURCHASING, ACCOUNTS PAYABLE AND VENDOR FRAUD 1. Payment of invoices to a fictitious or otherwise manipulated entity The embezzler establishes a fake entity or has control over a real entity, and enters transactions into the payments stream through the vendor master file or as a one-time payment vendor. An invoice is produced and processed. Funds are diverted by check or electronic payment. 2. Kickback or other similar incentives are used to: a) Vendor allowed to submit fraudulent billing and approving the payment (goods not received or services not performed, billing more than once for the same item, providing low quality items but billing for the higher quality) b) Allow excess purchase of property or services c) Facilitate bid rigging d) Maintain the relationship 3. Common Red Flags, Symptoms and Indicators Fictitious vendors and related payments schemes: a) Photocopied invoices, invoices with signs of tampering, or invoices on plain paper when preprinted forms might be expected b) No phone number on the invoice; no tax ID number on file c) Address, tax ID number or phone number is the same as an employee, another vendor or a related party d) Vendor names are a knockoff of a well-known business ( IBN Consulting ) e) The amount of invoices falls just below approval threshold levels f) Invoices numbers from vendors occur in an unbroken consecutive sequence Kickbacks: a) High level manager handles all matters related to a vendor even though this level of attention might be outside or below normal duties b) Vendors receive a large amount of business for no apparent business reason c) Prices from a particular vendor are unreasonably high when compared to others, and/or quality of goods or services received from a vendor is low d) Tips or complaints from other employees or honest vendors e) Key contracts awarded with no formal bid process f) Purchase of excess goods John@JohnHallSpeaker.com Page 18

21 FICTITIOUS / MANIPULATED VENDORS 1. Charity Adams + Two = $540, Elevator / Escalator Maintenance 3. Eagle County CO Charity 4. Dixon Illinois What Happened CASE STUDY: THE CONTROLLER $3.5 million taken over seven years 3 primary parts: a) Payments to janitorial company owned by the controller and his wife b) Work on two homes and a vacation condo c) Gift cards from a national warehouse club retailer Who Did It 63 year old controller Male, married with grandchildren Poor health Approaching retirement Marginal performer 25 year employee at time scheme started Had ability to initiate, approve and code transactions Month-end authority allowed moving costs by journal entry Symptoms, Red Flags and Indicators Significant spend amounts Poor plant financial performance Large budget variances Excessive volume of journal entries Missed closing deadlines Known related party Unqualified accounting assistant Dramatic change in lifestyle / personal spend patterns John@JohnHallSpeaker.com Page 19

22 FRAUD EXPOSURES IN PROCUREMENT AND CONTRACTING 1. Bid rigging, price fixing, collusion and other Shadow Deals: a) The Crawford Case 2. Material or skills substitution: a) Consulting, legal, and public accounting field promotions 3. Alternate methods employed: a) Shotcrete v. formed and poured b) PVC v. copper 4. Excess hours, materials or other measures on T&M contracts: a) Data cable installation b) Bovis Lend Lease 5. Buyouts on subcontracted work and suppliers: a) Disclosed v. undisclosed savings 6. Defective pricing: a) Equipment rental b) Change order pricing 7. Cost Accounting exposures: a) Labor and related burden (The Wisconsin Contractor) Labor rates Payroll taxes Insurance and other charges Methodology and/or application errors b) Non-reimbursable costs (hockey teams and fishing trips) c) General conditions d) Falsification of records Page 20

23 THE CRAWFORD CASE COST PAYEE CODE DOCUMENT DESCRIPTION LABOR MATERIAL SUBCON EQUIP OTHER TOTAL Cost Code 1024: Painting / Base Building 1024 Inv# SC ABC Construction 22, , Inv# APP Meteor Painting LLC 11, , Inv# SC ABC Construction 18, , Inv# SC Meteor Painting LLC 7, , Inv# SC ABC Construction -2, , , , , Cost Code 1028: Structural / Seizmic Work 1028 Inv# SC ABC Construction 70, , Inv# Kidder Metal Fabric 62, , Inv# SC ABC Construction 170, , Inv# 3277 Structural Imaging Inv# SC-I073 ABC Construction -7, , , , , GROUP DISCUSSION NOTES John@JohnHallSpeaker.com Page 21

24 20 DETECTION SUGGESTIONS PROCUREMENT AND CONTRACTING 1. Analyze bids, looking for patterns by vendor or purchasing agent 2. Confirm losing bids and failure to respond to bids and Requests for Quotations 3. Audit vendors transaction records, T&E, 1099 s 4. Surprise count and inspect at receiving points 5. Match PO, proof of receipt, and invoice 6. Observe inventory held by others 7. Observe highly tempting items 8. For sole source vendors, confirm existence, prove ownership, test prices, find other sources, and analyze usage volumes. Verify sole source justification 9. Reconcile inventory, purchases and usage of items subject to pilferage 10. Audit rental of equipment, including equipment rental used by contractors 11. Verify accuracy of items that must be stored in containers (gases, liquids, other) 12. Audit areas where vendors come in, take stock of existing levels, and replenish stocks on their own 13. Audit purchases that do not go through normal purchasing procedures 14. Audit maintenance agreements 15. Audit property management agreements 16. Audit costs on cost-plus agreements to original documentation. Look for creative interpretations of the term cost by vendors or contractors 17. Pull D&B reports and enter vendor names into press databases 18. Use computer to look for multiple PO and split bills 19. Confirm delivery locations 20. Verify address and other master file changes by vendor John@JohnHallSpeaker.com Page 22

25 1. REVENUE RECOGNITION COOKING THE FINANCIAL BOOKS Recording fictitious sales to nonexistent customers and recording phony sales to legitimate customers These schemes normally occur near the end of an accounting period and may involve the issuing of some form de facto reversal of the sale soon after the end of the accounting period Recording revenue on transactions that do not meet the revenue recognition criteria may include transactions where right of return exists, bill-and-hold transactions, accelerated percentage-of-completion recognition, and transactions where the earnings process is not complete. Recognizing revenue in the wrong period most common is recognition of revenue on anticipated future sales. Often involves altering dates on shipping documents or keeping the records open until the shipment has occurred. 2. OVERVALUED ASSETS Overvaluing assets is a relatively simple way to directly manipulate reported financial results, since overstated assets usually result in understated expenses. Common schemes for reporting overvalued assets include: a) Inflating the value or quantity of inventory on the balance sheet (PharMor) b) Capitalization of costs that should have been expensed (WorldCom) c) Including non-business assets on the balance sheet (boats and exotic cars) d) Failure to recognize impairment losses on long-lived assets 3. UNDERREPORTED LIABILITIES a) Recognition of assets without related liability effect (Enron) b) Understating accounts payable by recording purchases in subsequent accounting periods, overstating purchase returns, or falsifying documents that make it appear that liabilities have been paid off c) Failure to record all debt or other liabilities, or recognize contingent liabilities d) Underreporting future obligations such as warranty costs 4. HOW AUDITORS WERE FOOLED: LESSONS FROM FAMOUS CASES a) ZZZZ Best b) Peregrine Financial Group John@JohnHallSpeaker.com Page 23

26 COOKING OTHER RESULTS 1. VW and Mitsubishi 2. School district cheating 3. Shadow Curriculum for elite athletes 4. Side effects from drugs 5. Family Connections Page 24

27 DISCUSSION QUESTIONS MANAGEMENT OVERRIDE RISK 1. High-profile cases usually involve high-level taking advantage of their authority to override controls. What should we do during the planning and performance phases of our projects to take into account the possibility of management override to commit and conceal fraud? Be specific. 2. One difficult fraud exposure involves override by top executives and fraud for the benefit of the organization. Have you encountered any instances of senior manager or executive override to commit fraud? Provide details of what happened and how it was discovered. 3. Another macro fraud risk involves fraud committed for the benefit of the organization. Examples include a pattern of manipulating high-level financial or operating results, misleading government agencies, misrepresenting the capabilities of products or services sold, and similar events. Have you encountered any instances of fraud for the benefit of the organization? To the extent you can, provide details of what happened and how it was discovered. 4. Most auditors would agree that we should detect material management fraud in the organizations we audit. After all, if the fraud is big enough to be material, it should be big enough to detect. But what about management fraud that does not hit the standard of materiality? The one that happens all too frequently and is material to the manager s compensation. Should auditors be responsible for detection of such immaterial financial or other results reporting fraud? John@JohnHallSpeaker.com Page 25

28 FRAUD INDICATORS, BEHAVIORS, AND RESPONSE The most reliable indicators are those that appear in transaction records. Also important are behaviors that are often observed in individuals engaged in wrongful acts. Examples include: Refusing to share transaction information and support that should be available to others with a legitimate need to know Refusing to train subordinates, particularly in duties related to financial closing procedures, reconciliations, and dealings with customers and suppliers High volume of business is directed to suppliers for no apparent reason Excessive entertainment or gifts from suppliers Tips or complaints about an individual s behavior Unusual travel or work time patterns Living well beyond one s means with no reasonable explanation Wheeler-dealer attitude Rationalization of contradictory behavior Excessive gambling or other speculation Substance abuse Not taking vacations of more than two or three days Special caution should be demonstrated in following up on behavior symptoms. Be sensitive to privacy. Ask yourself, If this behavior I observe makes me uncomfortable for some reason, what wrongful actions might the individual be taking in their job that might be evidenced by behavior I see? React to the fraud exposure, not to the behavior. Look in the records to see if a wrongful act is occurring. Better still call for help! AVOID OVERREACTING TO FRAUD INDICATORS. Follow up on the indicator to determine the true cause. DISCUSSION QUESTIONS 1. From a past fraud case you have knowledge about, identify a symptom or indicator of the fraud that was present in the records. 2. Do you know of a case where the fraudster s lifestyle or personal habits might have been a tip off to their wrongdoing? John@JohnHallSpeaker.com Page 26

29 FRAUD RESPONSE IS IN PLACE AND READY TO GO Identify the skills and relationships that will be needed when fraud is detected, and assemble the team in advance. Craft the message you want to deliver to employees, customers, the press and others. Know who will be authorized to investigate, handle requests for information, and interface with any outside parties. Response challenges: 1) Uncertainty and fear 2) Response readiness 3) Loss recovery 4) Reporting to the authorities 5) Insurance 6) Morale and HR 7) Publicity 8) Learning from fraud events Incident response resources: 1) Experienced investigators 2) Forensic accountants 3) Information technology experts 4) Computer forensics experts 5) Other technical specialists 6) Security / Loss prevention 7) Internal auditors 8) Human resources 9) Legal and compliance John@JohnHallSpeaker.com Page 27

30 INVESTIGATION MANAGEMENT OVERVIEW 1. Investigation is not for everyone. There are inherent risks, and things can go wrong. The auditor or examiner may be lied to, attacked as to qualifications and professionalism, and subject to scrutiny they have not experienced in the past. 2. Don t investigate without a policy. Make sure of your authority and the limits of that authority. Ask: What will the organization do if I m sued? And get a solid answer preferably in writing. The auditor or examiner is not a deep pocket. But a tactical suit may be aimed at discrediting the individual who performed the work and thereby weakening the conclusions in the eyes of others. 3. Do not do anything that is unauthorized or illegal. 4. There should be clear policy on when to report to law enforcement or other governmental authorities. 5. Each fraud incident is unique. Although there are many similarities in fraud cases, there is nothing completely identical from one investigation to another. The actual scope, methodology and strategy in each investigation will vary. However, there are efficiency opportunities from building lists of helpful investigative practices. a) Develop a Fraud Investigation Checklist. It should include typical steps to be performed and sources of information. b) Consider developing an Investigative Resource Guide. Keep track of the types of information needed during an investigation and the sources used to find it. Use the Guide as a tool on investigations and keep it current. 6. Case Reports for Executive Management: a) Speak to intent: Was it an error or on purpose b) Who did it? Who else was involved? c) Extent of the loss d) Recovery potential or status e) How it was done and the internal control implications 7. Reports for law enforcement and insurance companies: a) Sequence of events b) Relevant company policies and procedures c) Copies of documents d) Reference review by counsel e) Exclude internal control implications? John@JohnHallSpeaker.com Page 28

Managing Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970)

Managing Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970) Managing Fraud Risks in Procurement & Contacting The IIA Los Angeles Chapter October 2, 2017 John J. Hall, CPA (970) 926-0355 John@JohnHallSpeaker.com 1 Four Categories 1. Theft 2. Results Manipulation

More information

CPA Leadership Institute Webinar July 8, John J. Hall, CPA

CPA Leadership Institute Webinar July 8, John J. Hall, CPA CPA Leadership Institute Webinar July 8, 2015 John J. Hall, CPA John@JohnHallSpeaker.com RISK MANAGEMENT Improve performance by acknowledging and controlling risks Solutions to protect and conserve the

More information

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement

More information

STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD

STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD 1 10.1 Fraud -- Nature, Prevention, and Detection..................................... 1 10.2 Fraud -- Indicators........................................................

More information

- Excessive gambling or investment habits - Strong challenge to beat the system - Undue family pressure such as divorce - Overwhelming desire for pers

- Excessive gambling or investment habits - Strong challenge to beat the system - Undue family pressure such as divorce - Overwhelming desire for pers RED FLAGS OF INTERNAL FRAUD PROFILE OF THE PERPETRATOR: - Most frequently it is the person you trust the most - Has the technical skills to pull off the theft secretly - The activity is clandestine - The

More information

Fraud Prevention, Detection, and Internal Controls

Fraud Prevention, Detection, and Internal Controls Fraud Prevention, Detection, and Internal Controls Budget, Accounting and Reporting Council May 28, 2015 Sherrie Ard, CPA, CFE Financial Management Specialist Local Government Performance Center Local

More information

OVERVIEW 4/19/10. Internal Controls and the Audit Process May 4, 2010 OVERVIEW. Definition and historical perspective of internal auditing

OVERVIEW 4/19/10. Internal Controls and the Audit Process May 4, 2010 OVERVIEW. Definition and historical perspective of internal auditing and the Audit Process May 4, 2010 Presented by: Deborah A. Stevens CPA Wichita County Auditor 1 OVERVIEW Definition and historical perspective of internal auditing Role and responsibilities of the internal

More information

Contract and Procurement Fraud. Fraud in Procurement without Competition

Contract and Procurement Fraud. Fraud in Procurement without Competition Contract and Procurement Fraud Fraud in Procurement without Competition Sole-Source Awards Noncompetitive procurement process through the solicitation of only one source Procurement through sole-source

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

Common Frauds Found in Not-for- Profit Organizations

Common Frauds Found in Not-for- Profit Organizations Common Frauds Found in Not-for- Profit Organizations NCACPA Not-for-Profit Conference May 19, 2015 Presented by Lynda M. Dennis CPA, CGFO, PhD Today s Session Overview 2014 Occupational Fraud Report Findings

More information

2/27/2017. Segregation of Duties/ Internal Controls. Objectives. Agenda

2/27/2017. Segregation of Duties/ Internal Controls. Objectives. Agenda Segregation of Duties/ Internal Controls 2017 WASBO Accounting Conference David Maccoux, Shareholder Objectives Discuss failures of internal controls to detect or prevent fraud and learn how to implement

More information

Keep Procure-to-Pay (P2P) Fraud at Bay with Fraud Detection Tools & Techniques

Keep Procure-to-Pay (P2P) Fraud at Bay with Fraud Detection Tools & Techniques Keep Procure-to-Pay (P2P) Fraud at Bay with Fraud Detection Tools & Techniques Chris Doxey, CAPP, CCSA, CICA, CPC President, Doxey, Inc. chris@chrisdoxey.com 571-267-9107 2 May 7-9, 2017 Chris Doxey, CAPP,

More information

Understanding Internal Controls Office of Internal Audit

Understanding Internal Controls Office of Internal Audit Understanding Internal Controls Office of Internal Audit July 2015 Objectives for this manual Provide guidance to help management understand their responsibility to ensure that internal controls are established,

More information

FRAUD RISK FACTORS CHECKLIST (Source: New AU Section 240, Appendix A)

FRAUD RISK FACTORS CHECKLIST (Source: New AU Section 240, Appendix A) Page 136 of 174 FRAUD RISK FACTORS CHECKLIST (Source: New AU Section 240, Appendix A) RECOGNIZING RISK FACTORS THAT SHOULD GET YOUR ATTENTION How to use the checklist: 1. Review this checklist towards

More information

OUTSMART FRAUD. Strategic Internal Controls to Prevent Business Fraud

OUTSMART FRAUD. Strategic Internal Controls to Prevent Business Fraud OUTSMART FRAUD Strategic Internal Controls to Prevent Business Fraud GrowthForce LLC 800 Rockmead Drive Suite 200 Phone 281.358.2007 Fax 281.358.4120 OUTSMART BUSINESS FRAUD Using statistical data from

More information

Fraud Prevention: How to Identify and Protect Your Higher Ed Institution

Fraud Prevention: How to Identify and Protect Your Higher Ed Institution Fraud Prevention: How to Identify and Protect Your Higher Ed Institution November 16, 2017 Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered investment

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Specific Anti-Fraud Controls (Process or Transaction Level) 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization have adequate staffing

More information

The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions

The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Technology for Business Assurance The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application

More information

38 Years of Excellent Client Service New COSO Model and How Internal Controls Help to Reduce Opportunity for Fraud

38 Years of Excellent Client Service New COSO Model and How Internal Controls Help to Reduce Opportunity for Fraud 38 Years of Excellent Client Service New COSO Model and How Internal Controls Help to Reduce Opportunity for Fraud Presented By William Blend, CPA, CFE Session Overview Review the new COSO model on internal

More information

CODE OF CONDUCT A MESSAGE FROM OUR CEO. Dear Colleagues:

CODE OF CONDUCT A MESSAGE FROM OUR CEO. Dear Colleagues: CODE OF CONDUCT A MESSAGE FROM OUR CEO Dear Colleagues: Few things are as important as your reputation. That s true for companies and individuals alike. Logitech s ethical reputation is the foundation

More information

Internal Control Evaluation

Internal Control Evaluation INTERNAL CONTROL EVALUATION Adapted from a checklist created by Jackie F. Breland, CPA (www.jackiebreland.com) Organization: Date Prepared or Updated: Prepared by: Introduction The purpose of this checklist

More information

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers,

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, agents, vendors and sub-contractors). To help guide

More information

INTERNAL AUDIT EFFECTIVENESS. Conducting Fraud Investigations Conducting Internal Audit

INTERNAL AUDIT EFFECTIVENESS. Conducting Fraud Investigations Conducting Internal Audit INTERNAL AUDIT EFFECTIVENESS Conducting Fraud Investigations Conducting Internal Audit Conducting Fraud Investigations Why Fraud? Fraud is the product of three factors: Supply of motivated offenders; The

More information

Week 3: Fraud, Procure to Pay Process Controls

Week 3: Fraud, Procure to Pay Process Controls Edward Beaver Edward.Beaver@temple.edu ff MIS 5121: Business Processes, ERP Systems & Controls Week 3: Fraud, Procure to Pay Process Controls Video: Record the Class Discussion v Something really new,

More information

Embezzlement & Fraud How You Can Protect Yourself. Pam Newman, CMA,CFM, MBA

Embezzlement & Fraud How You Can Protect Yourself. Pam Newman, CMA,CFM, MBA Embezzlement & Fraud How You Can Protect Yourself Pam Newman, CMA,CFM, MBA Pam Newman BS and MBA from University of Nebraska CMA Certified Management Accountant CFM Certified Financial Manager President

More information

Chapter 7 Internal Controls

Chapter 7 Internal Controls Chapter 7 Internal Controls Establishment of and adherence to internal controls is a major part of managing an organization. Internal controls serve as the first line of defense in safeguarding assets

More information

CODE OF ETHICS/CONDUCT

CODE OF ETHICS/CONDUCT CODE OF ETHICS/CONDUCT This Code of Ethics/Conduct ( Code ) covers a wide range of business practices and procedures. It does not cover every possible issue that may arise, but rather provides information

More information

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004 1. Introduction CODE OF BUSINESS CONDUCT AND ETHICS FRONTIER AIRLINES, INC. Adopted May 27, 2004 The Board of Directors adopted this Code of Business Conduct ( Code ) to establish basic legal and ethical

More information

FOUNDATION BUILDING MATERIALS, INC. EMPLOYEE CODE OF CONDUCT

FOUNDATION BUILDING MATERIALS, INC. EMPLOYEE CODE OF CONDUCT FOUNDATION BUILDING MATERIALS, INC. EMPLOYEE CODE OF CONDUCT Foundation Building Materials, Inc. (the Company ) conducts its business in accordance with the highest ethical standards of corporate leadership

More information

ACFE FRAUD PREVENTION CHECK-UP ASSOCIATION OF CERTIFIED FRAUD EXAMINERS

ACFE FRAUD PREVENTION CHECK-UP ASSOCIATION OF CERTIFIED FRAUD EXAMINERS ACFE FRAUD PREVENTION ASSOCIATION OF CERTIFIED FRAUD EXAMINERS ACFE FRAUD PREVENTION One of the ACFE s most valuable fraud prevention resources, the ACFE Fraud Prevention Check-Up is a simple yet powerful

More information

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS

RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS RELM WIRELESS CORPORATION (the Company ) CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not

More information

Using Data Analytics as a Management Tool to Identify Organizational Risks

Using Data Analytics as a Management Tool to Identify Organizational Risks 2013 CliftonLarsonAllen LLP Using Data Analytics as a Management Tool to Identify Organizational Risks Government Finance Officers Association of South Carolina October 13, 2014 cliftonlarsonallen.com

More information

Internal Fraud Monitoring & Investigation Best Practices. By Tom Holland, CFE

Internal Fraud Monitoring & Investigation Best Practices. By Tom Holland, CFE Internal Fraud Monitoring & Investigation Best Practices By Tom Holland, CFE BSA Coalition Training BSA Event Coalition Anti-Money February Laundering 9, 2010 Conferencewww.bsacoalition.org The Threat

More information

Supply Chain Fraud & Integrity

Supply Chain Fraud & Integrity Supply Chain Fraud & Integrity Hosted by United States Fashion Industry Association (USFIA) and May 17, 2017 8:30 A.M. Eastern/5:30 A.M. Pacific Do you have a question? During the webinar, all attendees

More information

Code of Business Conduct and Ethics

Code of Business Conduct and Ethics Code of Business Conduct and Ethics Table of Contents Purpose... 1 Scope... 1 Policy... 2 Responsibilities... 8 Enforcement... 8 Review and Revision... 8 PURPOSE Pursuant to the Sarbanes-Oxley Act of 2002

More information

Compliance with Laws, Rules and Regulations

Compliance with Laws, Rules and Regulations R1 RCM Inc. (hereafter, R1 or the Company ) is committed to the conduct of its business in an ethical, legal, and transparent manner. In turn, the Company expects that all employees, contractors and vendors

More information

Internal Controls Integrating COSO

Internal Controls Integrating COSO Community Action Partnership 2016 Annual Convention August 30 September 2, 2016 Austin, TX J.W. Marriott Austin Internal Controls Integrating COSO Thursday, September 1, 2016 9:15 am 10:45 am Presented

More information

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA IV. PAYROLL SCHEMES Overview Payroll schemes occur when an employee

More information

AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk

AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young ICPAU Page 1 COURSE CONTENT Lessons on Audit Risk Identification of audit risk and audit risk assessment

More information

CODE OF ETHICS AND CONDUCT

CODE OF ETHICS AND CONDUCT CODE OF ETHICS AND CONDUCT PREFACE Green Mountain Power s Code of Ethics and Conduct is about doing the right thing acting honorably, treating each other with respect, and following the law. It s built

More information

OVERVIEW. Common Personality Traits of Fraudsters. Common Sources of Pressure. Changes in Behavior

OVERVIEW. Common Personality Traits of Fraudsters. Common Sources of Pressure. Changes in Behavior Red Flags of Fraud OVERVIEW Red Flags of Fraud are warning signs that may indicate a higher fraud risk. They are NOT evidence that fraud is actually occurring. Many employees demonstrate one or more of

More information

Auditing for Fraud. Planning & Approaches

Auditing for Fraud. Planning & Approaches Auditing for Fraud Planning & Approaches Today s Agenda Introductions What is Fraud? Internal audit and fraud Managing Fraud as an organization 2 Today s Agenda Introductions 3 Clark Schaefer Consulting?

More information

PATAGONIA WORKS GLOBAL CODE OF EMPLOYEE CONDUCT

PATAGONIA WORKS GLOBAL CODE OF EMPLOYEE CONDUCT PATAGONIA WORKS GLOBAL CODE OF EMPLOYEE CONDUCT Photo: Mikey Schaefer Introduction Patagonia Works and all of its operating companies intend to be in business for a long time and operate in a way that

More information

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics (as of January 28, 2013) Introduction This sets forth the guiding principles by which we operate Computer Programs and Systems, Inc. (the Company ) and conduct our daily business with our stockholders,

More information

Guide to Internal Controls

Guide to Internal Controls Guide to Internal Controls Table of Contents Introduction to Internal Controls...3 Roles...4 Components....5 Control Environment...5 Risk assessment...6 Control Activities...7 Information & Communication...9

More information

Using Transactional Analysis for

Using Transactional Analysis for Using Transactional Analysis for Effective Fraud Detection Date: 15 th January 2009 Nishith Seth Seth Services.P. Ltd. www.sspl.net.in Cost Indirect costs: image, morale Fraud Issues & Impact Direct costs:

More information

Prince William County Public Schools Annual Audit Plan

Prince William County Public Schools Annual Audit Plan Prince William County Public Schools 2011 Annual Audit Plan Office of Internal Audit Vivian Calkins-McGettigan, MBA, CPA, CPFO Chief Internal Auditor Table of Contents Foreword 3 Introduction to the Office

More information

Audit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to:

Audit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to: chapter 9 Audit evidence Chapter learning objectives When you have completed this chapter you will be able to: explain the assertions contained in the financial statements explain the use of assertions

More information

Comprehensive List of Fraud Indicators

Comprehensive List of Fraud Indicators Comprehensive List of Fraud Indicators This document provides links to our contract audit resources. The scenarios are grouped by audit type, but the issues presented could be applicable to other audits

More information

Office of the Utah Legislative Auditor General. Fraud Prevention. Utah Government Finance Officers Association. Spring 2017 Conference

Office of the Utah Legislative Auditor General. Fraud Prevention. Utah Government Finance Officers Association. Spring 2017 Conference Office of the Utah Legislative Auditor General Fraud Prevention Utah Government Finance Officers Association Spring 2017 Conference Utah Legislative Auditor General Constitutional Charge and Authority

More information

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS

BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS September 2003 BIG LOTS, INC. CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business principles to guide all directors, officers and associates

More information

AN AUDIT OF INTERNAL CONTROL THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: GUIDANCE FOR AUDITORS OF SMALLER PUBLIC COMPANIES

AN AUDIT OF INTERNAL CONTROL THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: GUIDANCE FOR AUDITORS OF SMALLER PUBLIC COMPANIES 1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org PRELIMINARY STAFF VIEWS AN AUDIT OF INTERNAL CONTROL THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL

More information

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS

ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS ASSOCIATED BANC-CORP CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics covers a wide range of business practices and procedures. It does not cover every issue that

More information

Code of Business Conduct

Code of Business Conduct Code of Business Conduct and Ethics Table of Contents The O Reilly Culture... 1 Introduction... 2 Administration... 3 Compliance Procedures... 3 Reporting of Illegal or Unethical Behavior... 3 Report Misconduct...

More information

MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING

MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING MODULE I: MEDICARE & MEDICAID GENERAL COMPLIANCE TRAINING 2 0 1 4 A Message From Our CEO and Compliance Officer At PacificSource, we pride ourselves on maintaining a culture of compliance and high ethical

More information

FRAUD IN GOVERNMENT AN OPEN DISCUSSION. Presented By William Blend, CPA, CFE

FRAUD IN GOVERNMENT AN OPEN DISCUSSION. Presented By William Blend, CPA, CFE FRAUD IN GOVERNMENT AN OPEN DISCUSSION Presented By William Blend, CPA, CFE AGENDA Fraud and Ethics Discussion Fraud Triangle and Beyond Data from 2016 ACFE Report to the Nations Recent Fraud Investigations

More information

CARNIVAL CORPORATION & PLC

CARNIVAL CORPORATION & PLC CARNIVAL CORPORATION & PLC Business Partner Code of Conduct and Ethics A Letter from our CEO Building and maintaining trust in our business relationships and pursuing the highest standards of ethical behavior

More information

Code of Business Ethics & Conduct

Code of Business Ethics & Conduct Code of Business HGA s success depends on conducting itself in accordance with the highest ethical standards and in full compliance with applicable law. Working with clients throughout the United States

More information

Due: Tuesday, May 1, 2007 by 5:45 p.m.

Due: Tuesday, May 1, 2007 by 5:45 p.m. A439: Advance Auditing 2007 Final exam Directions: The final exam consists of 30 multiple choice questions. Ground Rules. As a take-home exam you may use notes, the internet, auditing textbooks or other

More information

Managing Risk in Your P2P Process: 10 Ways that Automation Can Help Mitigate Risk

Managing Risk in Your P2P Process: 10 Ways that Automation Can Help Mitigate Risk Managing Risk in Your P2P Process: 10 Ways that Automation Can Help Mitigate Risk Chris Doxey, CAPP, CCSA, CICA, CPC President, Doxey, Inc. chris@chrisdoxey.com 571-267-9107 Agenda Introduction to Risk

More information

10 Things You Need to Know Before Buying a New or Used Cosmetic Laser

10 Things You Need to Know Before Buying a New or Used Cosmetic Laser 10 Things You Need to Know Before Buying a New or Used Cosmetic Laser Like brand new automobiles, brand new cosmetic laser equipment heavily depreciates as soon as it leave the manufacturer and enters

More information

Review Internal Controls: A Prac4cal Applica4on Guide #2035

Review Internal Controls: A Prac4cal Applica4on Guide #2035 Review Internal Controls: A Prac4cal Applica4on Guide #2035 Presented by Alan Wenk Performance Contrac4ng Inc. WORLD- CLASS CONSTRUCTION Alan.Wenk@pcg.com Session Objective This session will provide a

More information

Decisions, decisions. With so many choices available to us, how can we be sure we're making the right decision?

Decisions, decisions. With so many choices available to us, how can we be sure we're making the right decision? LESSON PLAN Consumer Awareness Combine decision-making methods with comparative shopping techniques, recognize common consumer scams, and provide the knowledge and skills necessary to effectively handle

More information

Take stock, take control with Sage 50

Take stock, take control with Sage 50 Take stock, take control with Sage 50 How you manage your accounting controls can be the difference between creating a successful small business and filing for bankruptcy. With Sage 50, you have accurate,

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS CODE OF BUSINESS CONDUCT AND ETHICS PURPOSE && SCOPE As a Trimac team member it is important to know that everyone must act ethically, morally and legally at all times no exceptions. This document outlines:

More information

EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST

EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST Page 128 of 174 EMPLOYEE FRAUD OPPORTUNITIES CHECKLIST Recognizing Warning Signs and Preventing Problem Situations Why are consistent internal controls important? Management decisions, financial reports,

More information

Computershare Group Code of

Computershare Group Code of Computershare Group Code of Conduct A Message from the President & CEO Underpinning everything we do as a business are our three core values: Certainty: to deliver our services and solutions right first

More information

Seattle Public Schools The Office of Internal Audit

Seattle Public Schools The Office of Internal Audit Seattle Public Schools The Office of Internal Audit Internal Audit Report September 1, 2014 through Current Issue Date: June 21, 2016 Executive Summary Background Information The function is centralized

More information

Diocese of Covington Policies & Procedures Manual Section: Compliance Accounting Policy: Internal Control & Segregation of Duties

Diocese of Covington Policies & Procedures Manual Section: Compliance Accounting Policy: Internal Control & Segregation of Duties Internal Control refers to the policies and procedures established to provide reasonable assurance that parish assets are safeguarded, that accountability is achieved, and that errors in financial records

More information

Code of Conduct & Ethics

Code of Conduct & Ethics Code of Conduct & Ethics Interfor Code of Conduct & Ethics Contents Page 1 CEO Message A Message from our CEO 2 Our Code of 2 Conduct & Ethics Our Code of Conduct & Ethics 3 3 Guiding Principles Guiding

More information

INTERNATIONAL STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT CONTENTS

INTERNATIONAL STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT CONTENTS INTERNATIONAL STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT (Effective for audits of financial statements for periods beginning

More information

Internal Control Questionnaire and Assessment

Internal Control Questionnaire and Assessment Bureau of Financial Monitoring and Accountability Florida Department of Economic Opportunity September 30, 2017 107 East Madison Street Caldwell Building Tallahassee, Florida 32399 www.floridajobs.org

More information

Internal Control Questionnaire

Internal Control Questionnaire Internal Control Questionnaire CASH RECEIPTS/SALE QUESTIONS: 1. Is there a designated cash receipt custodian? 2. Are all receipts recorded on pre-numbered cash receipts tickets, including those received

More information

INTERNAL CONTROL HANDBOOK

INTERNAL CONTROL HANDBOOK INTERNAL CONTROL HANDBOOK INTERNAL CONTROL HANDBOOK ILLINOIS STATE BOARD OF EDUCATION SCHOOL BUSINESS SERVICES DIVISION Revised July, 2017 Most Content remains the same as published in 1993 Prepared by

More information

Guide to Internal Controls

Guide to Internal Controls Guide to Internal Controls Updated January 2017 The Guide to Internal Controls was developed to help you establish and maintain effective internal controls in your department/division. This guide summarizes

More information

Mr. Jim Sylph Technical Director International Auditing and Assurance Standards Board 545 Fifth Avenue, 14th Floor New York, NY 10017

Mr. Jim Sylph Technical Director International Auditing and Assurance Standards Board 545 Fifth Avenue, 14th Floor New York, NY 10017 William G. Bishop III, CIA President Tel: +1 407 937 1200 wbishop@theiia.org November 15, 2003 Mr. Jim Sylph Technical Director International Auditing and Assurance Standards Board 545 Fifth Avenue, 14th

More information

The Episcopal Diocese of Kentucky

The Episcopal Diocese of Kentucky The Episcopal Diocese of Kentucky Internal Control Questionnaire Manual of Business Methods in Church Affairs (Spring 2012) Chapter II: Internal Controls, Section C The following Internal Control Questionnaire

More information

9/13/2017 CHA-CHING! PAYROLL CONTROLS THAT PAY OFF PERSONAL INTRODUCTION. Personal Introduction. Melinda Stinnett, CPA, CIA Managing Director

9/13/2017 CHA-CHING! PAYROLL CONTROLS THAT PAY OFF PERSONAL INTRODUCTION. Personal Introduction. Melinda Stinnett, CPA, CIA Managing Director CHA-CHING! PAYROLL CONTROLS THAT PAY OFF Melinda Stinnett, CPA, CIA Managing Director September 15, 2017 1 PERSONAL INTRODUCTION Professional Bachelor s Degree (Accounting) Oklahoma State University Public

More information

Entity level controls Design/implementation 530 Page 1 of 9

Entity level controls Design/implementation 530 Page 1 of 9 Page 1 of 9 Entity Period ended Objective: To document the design and implementation of the following elements of internal control: Environment Assessment Financial Reporting (part of information systems)

More information

The FMA Institute Courses & Resources

The FMA Institute Courses & Resources The FMA Institute Courses & Resources Institute Overview The Blog Course Descriptions & Prices FUND E-Z FMA articles 1 The FMA Institute is committed to developing nonprofit financial leaders and facilitating

More information

Bottom-line Savings through Contract Compliance and Cost Recovery

Bottom-line Savings through Contract Compliance and Cost Recovery Bottom-line Savings through Contract Compliance and Cost Recovery Presenters: George Albarelli, John Fiore, Chris Fejko and Tarek Ibrahim November 13, 2012 General Information Share the webinar Ask a question

More information

Introduction & Welcome

Introduction & Welcome Introduction & Welcome Thank you for your interest the Crafter s Choice Distributor Program. You will find that by offering the Crafter s Choice brand of products, you will be offering your customers the

More information

AMETEK, Inc. Code of Ethics and Business Conduct

AMETEK, Inc. Code of Ethics and Business Conduct AMETEK, Inc. Code of Ethics and Business Conduct Code of Ethics and Business Conduct A Message from the Chairman of the Board and Chief Executive Officer Dear AMETEK Colleague: AMETEK has been in business

More information

RSM US CODE OF CONDUCT GROUNDED IN OUR VALUES - RESPECT, INTEGRITY, TEAMWORK, EXCELLENCE AND STEWARDSHIP

RSM US CODE OF CONDUCT GROUNDED IN OUR VALUES - RESPECT, INTEGRITY, TEAMWORK, EXCELLENCE AND STEWARDSHIP RSM US CODE OF CONDUCT GROUNDED IN OUR VALUES - RESPECT, INTEGRITY, TEAMWORK, EXCELLENCE AND STEWARDSHIP MESSAGE FROM JOE ADAMS RSM US MANAGING PARTNER & CEO At RSM US LLP (RSM), we ve spent nearly 90

More information

FRAUD POLICY. Lesley Carnegie, Governance & Assurance Manager. Blackwood Managers will be made aware of updated policy by .

FRAUD POLICY. Lesley Carnegie, Governance & Assurance Manager. Blackwood Managers will be made aware of updated policy by  . FRAUD POLICY Version Number Issue 4.0 Date Revision Complete Policy Owner Author Reason for Revision Data Protection Equalities Impact Assessment Is it required? Yes/No Proof Read 2 nd March 2018 Head

More information

Defective Pricing- Material Pricing Deficiencies. Next Slide

Defective Pricing- Material Pricing Deficiencies. Next Slide Defective Pricing- Material Pricing Deficiencies Table of Contents Risk Assessment Research and Planning Risk Assessment - Initial Data Obtained from Contractor Risk Assessment Overrun or Underrun Analysis

More information

INTERNAL AUDIT Fraud Investigation Process Campus Administrative Training Series April 24, 2017

INTERNAL AUDIT Fraud Investigation Process Campus Administrative Training Series April 24, 2017 INTERNAL AUDIT Fraud Investigation Process Campus Administrative Training Series April 24, 2017 Stewart Cobine, CPA AVP & Chief Audit Officer Maggie Harrell, CFE Senior Investigative Auditor FOCUS OF SESSION

More information

Effective Ethics & Compliance Due Diligence during M&A Transactions

Effective Ethics & Compliance Due Diligence during M&A Transactions Effective Ethics & Compliance Due Diligence during M&A Transactions Kasey T. Ingram, JD, CCEP What this Program Will Do Give an overview of the challenges, considerations and risks that arise during the

More information

CODE OF ETHICS FOR CHIEF EXECUTIVE OFFICER AND SENIOR FINANCIAL OFFICERS UGI CORPORATION

CODE OF ETHICS FOR CHIEF EXECUTIVE OFFICER AND SENIOR FINANCIAL OFFICERS UGI CORPORATION CODE OF ETHICS FOR CHIEF EXECUTIVE OFFICER AND SENIOR FINANCIAL OFFICERS OF UGI CORPORATION Introduction The reputation for integrity of UGI Corporation (the Company ) is a valuable asset that is vital

More information

PURCHASING PROCEDURE GUIDE

PURCHASING PROCEDURE GUIDE PURCHASING PROCEDURE GUIDE As a publicly funded educational institution Arizona Western College is subject to public purchasing laws and regulations including State Statutes, District Governing Board policies,

More information

Fraud Detection and Prevention

Fraud Detection and Prevention Fraud Detection and Prevention Presented by: Louise Hanson, Moss Adams LLP Emily Ogden, Moss Adams LLP April 24, 2014 1 DISCLOSURE STATEMENT The material appearing in this presentation is for informational

More information

Contract and Procurement Fraud. Collusion Between Contractors and Employees

Contract and Procurement Fraud. Collusion Between Contractors and Employees Contract and Procurement Fraud Collusion Between Contractors and Employees Introduction Types of schemes involving collusion between contractors and procurement employees: Need recognition schemes Bid-tailoring

More information

IAASB Main Agenda (March 2005) Page Agenda Item 12-C

IAASB Main Agenda (March 2005) Page Agenda Item 12-C IAASB Main Agenda (March 2005) Page 2005 429 Agenda Item 12-C [ISA AND IAPS SPLIT] PROPOSED INTERNATIONAL AUDITING PRACTICE STATEMENT XXX THE APPLICATION OF INTERNATIONAL STANDARDS ON AUDITING IN AN AUDIT

More information

McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 04 Management Fraud and Audit Risk Learning Objectives 1. Define business risk and understand how management

More information

Financial Transactions and Fraud Schemes

Financial Transactions and Fraud Schemes Financial Transactions and Fraud Schemes Asset Misappropriation: Cash Receipts 2016 Association of Certified Fraud Examiners, Inc. Fraud Tree 2016 Association of Certified Fraud Examiners, Inc. 2 of 27

More information

Auditing Standards and Practices Council

Auditing Standards and Practices Council Auditing Standards and Practices Council PHILIPPINE STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT PHILIPPINE STANDARD ON AUDITING

More information

SUNRISE TELECOM CODE OF BUSINESS CONDUCT AND ETHICS Overview Sunrise Telecom is committed to its customers, partners, employees and stockholders.

SUNRISE TELECOM CODE OF BUSINESS CONDUCT AND ETHICS Overview Sunrise Telecom is committed to its customers, partners, employees and stockholders. SUNRISE TELECOM CODE OF BUSINESS CONDUCT AND ETHICS Overview Sunrise Telecom is committed to its customers, partners, employees and stockholders. Accordingly, we believe that operating with integrity is

More information

Diving into the 2013 COSO Framework. Presented by: Ronald A. Conrad

Diving into the 2013 COSO Framework. Presented by: Ronald A. Conrad Diving into the 2013 COSO Framework Presented by: Ronald A. Conrad 2 Objectives Obtain an understanding of why the COSO Framework has been updated Understand how the framework has changed Identify the

More information

Supplier Ethical Expectations

Supplier Ethical Expectations Supplier Ethical Expectations Training for Suppliers and Their Employees Revision 9, 2017 Course ID 00016572 1 Overview 1. What Intel Expects of Intel Employees Intel s Code of Conduct Intel s Anti-corruption

More information

"Finnair" and "Finnair Group" as used herein refer to Finnair Plc and its subsidiaries.

Finnair and Finnair Group as used herein refer to Finnair Plc and its subsidiaries. Code of Conduct 1 INTRODUCTION 1.1 Purpose and scope of this document Finnair is an iconic national airline and a respected member of the international aviation community with a solid reputation in safety,

More information