Predictive Analysis Risk Analysis

Size: px
Start display at page:

Download "Predictive Analysis Risk Analysis"

Transcription

1 Predictive Analysis Risk Analysis MARYLAND ASSOCIATION OF CPAS GOVERNMENT AND NOT-FOR-PROFIT CONFERENCE April 25, 2014 Overview Forensic Audit and Automated Oversight Data Analytics for Grant Oversight Data Analytics for Purchase Card 1

2 Forensic Audit Definition of Forensic Audit Audit that looks for financial misconduct, abuse, or wasteful activity More than Computer Assisted Audit Techniques (CAATs) Creates Relationships, Checks Calculations, Performs Comparisons Assess limitless number of analytical relationships Summarize large volume of data Database comparison 3 Automated Oversight More efficient use of resources 100% transaction review Still use traditional audit techniques to test transactions Opportunities to enhance oversight with less resources Improved risk identification Business rules based on risks Focus review on higher risks Recipients can use similar data analytics techniques Monitor grant spending Identify anomalies early 2

3 Data Versus Information An Endless Maze of Data... but No Information Different Levels of Knowledge Data Facts, numbers Information Summary Reports ACL, IDEA, Access Knowledge Descriptive Analytics SAS, SPSS, ACL, IDEA Wisdom Predictive Analytics Modeler Intelligent Miner Enterprise Miner NSF OIG does not endorse commercial products 3

4 Forensic Audit Approach Audit objectives and audit universe Structured brainstorming Consider Subject Matter Expert (SME) conference Identify indicators of potential fraud and ways to find in data Process to identify financial risks capture all ideas Map out the end-to-end process Identify systems and key processes Identify key controls Identify and obtain transaction-level data Record layout 1000 record dump ACL, IDEA, and Monarch can read virtually any data format Flat files, Delimited files, Dbase files, MS Access, Report files,. No file size limits Build targeted business rules and run against data Examine anomalies, work with investigations NSF OIG does not endorse commercial products Hardware Hardware and Software Applications SQL servers Mainframe (QMF) Docking stations Terminal server Software Applications Data mining and predictive analytics, e.g., Clementine Data interrogation e.g., ACL, IDEA, MS Access, Excel Statistical analysis e.g., SPSS and SAS Link analysis I2 Lexis-Nexis Data conversion utilities (Monarch) Internet, open-source research Access to system query tools NSF OIG does not endorse commercial products 4

5 Framework for End-to-End Payment Oversight A Data Analytics Approach Accounting Entitlement Grant Award Contracting Personnel Social Security, Medicare, Medicaid Medical Claims Electronic Fund Request SAM Electronic Invoice Paper Invoice Civilian, Military, Retiree Travel Claims Insurance Claims Award level Data: DUNS, CAGE, Institution ID, Award No., Award Amount Match databases with key fields (awardee IDs) Apply risk indicators to each payment record Summarize risks by awardee (award level risk) Direct Payment Loan Payment Grant Payment Contract Payment Transportation Purchase Card People Travel Payment Insurance Payment Continuous auditing Quick response and ad hoc Disbursing Federal Reserve ACH System Fedwire Transaction level Data: Payee, Institution ID, Award No., Invoice No., Payment Amt, Date, Bank Acct Data Analytics Identify high risk institutions or payees Identify high risk programs Surface questionable payments $$ Treasury Check Commercial Bank Oversight Review by GATB Auditors Investigators Agencies GuideStar (non profits) IRS 990 Federal Audit Clearinghouse Dunn and Bradstreet Master Death File (SSA) Do Not Pay (Treasury) that can help validate transactions and identify awardee and program risk CPARS, FPDS Brett Baker AIGA, NSF OIG Data Analytics: Myths and Realities MYTHS Data only, no fieldwork Numbers exercise Process changes data Findings unsupported Not auditing REALITIES Focuses fieldwork Source data not changed Traditional techniques still test support Findings have stronger support Yellow Book Compliance 5

6 Data Analytics Help. Determine reliability data fields Shape of the data (statistics) Completeness of transactions and fields Show anomalies Within a database Between databases Changes in behavior over time Develop risk profiles for comparisons Awardee profiles Award-type profiles Program profiles Common Data Analytics Tests Join Summarization Computed fields Blank fields (noteworthy if field is mandatory) Invalid dates Bounds testing Completeness Invalid codes Unreliable computed fields Illogical field relationships Trend analysis Duplicates 6

7 Data Analysis Fosters Creativity Can examine all records, not just a sample Tests not limited to What technical staff provides Predetermined data formats and/or relationships Can create relationships, check calculations, and perform comparisons Assess limitless analytical relationships Within large databases Comparing large databases Identifies anomalies Useful to identify misappropriation of assets and fraudulent financial reporting What is Data Mining? Refers to the use of machine learning and statistical analysis to find patterns in data sets. If you know exactly what you are looking for, use structured query language (SQL) If you only know vaguely what you are looking for, turn to data mining Most often used in marketing and customer analysis (until recently) 7

8 Methods of Data Mining Supervised modeling Predict patterns in data based on patterns of known information Decision trees Neural networks Unsupervised modeling Identify anomalies or outliers based on grouping similar transactions Kohonen Networks K-Means Clusters Control Charts 8

9 Comparing Data Files (Three Bucket Theory) Vendors Not Paid Yet Vendors Paid and In Vendor Table Vendors Paid but not In Vendor Table Vendor Table Disbursing Transactions Normal Distribution Anomalous Activity Normal Activity Anomalous Activity 9

10 Building a Forensic Capability Develop organizational capability All audit staff should have basic skill with data analysis tools Access to internal and external data Targeted audits are more efficient in time and cost Phased development Hardware and software Staff: system savvy, analytical, business process knowledge Training, then immediate application to work Forensic audit units perform more sophisticated analyses Tone at the top is an important component U.S. Financial Assistance Overview $550 billion in awards 88,000 awardees and 26 Federal grant making agencies Project and research, block, and formula Outcomes promote public good Challenges Limited visibility of how Federal funds are spent by awardees Support for funding requests is much less than for contracts American Recovery and Reinvestment Act (2009) $840 billion of assistance to stimulate the economy Greater accountability and transparency over spending than ever 10

11 Grants Differ From Contracts GRANTS Promote services for the public good Merit review (competitive) Multiple awardees Award budget No government ownership Grant payments Summary drawdowns No invoices for claims Expenditures not easily visible Salary percentages CONTRACTS Specified deliverables (Goods and Services) Competitive process One awardee Contract price Government ownership Contract payments Itemized payment requests Invoices to support claims Detailed costs Salary hourly rates Framework for Grant Oversight Data analytics-driven, risk-based methodology to improve oversight Identify institutions that may not use Federal funds properly Techniques to surface questionable expenditures Life cycle approach to oversight Mapping of end-to-end process to identify controls 100% review of key financial and program information Focus attention to award and expenditure anomalies Complements traditional oversight approaches Techniques to review process and transactions are similar Transactions of questionable activities are targeted 11

12 End to End Process for Grant Oversight 6 PRE-AWARD RISKS Funding Over Time Conflict of Interest False Statements False Certifications Duplicate Funding Inflated Budgets Candidate Suspended/Debarred ACTIVE AWARD RISKS Unallowable, Unallocable, Unreasonable Costs Inadequate Documentation General Ledger Differs from Draw Amount Burn Rate No /Late/Inadequate Reports Sub-awards, Consultants, Contracts Duplicate Payments Excess Cash on Hand/Cost transfers Unreported Program Income AWARD END RISKS No /Late Final Reports Cost Transfers Spend-out Financial Adjustments Unmet Cost Share Dr. Brett M. Baker, 2010 Data Sources Internal Proposals: budgets, panel scores Agency award systems, recipient reporting External Excluded Parties List System (EPLS) Central Contractor Registration (CCR/SAM) Public tax filings Federal Audit Clearinghouse (A-133 audits) Recipient financial system records General ledger and subsidiary ledgers Effort reporting Property Travel and purchase card Subaward monitoring 12

13 Risk Assessment and Identification of Questionable Transactions Phase I Identify High Risk Institutions Phase II Identify Questionable Expenditures Agency Award Data Award proposals Quarterly expense reports Cash draw downs Agency Award Data Award proposals Quarterly expense reports Cash draw downs Awardee Transaction Data General ledger Subsidiary ledgers Subaward data Data Analytics Continuous monitoring of grant awards and recipients Data Analytics Apply risk indicators to GL data and compare to Agency data Review Questionable Transactions External Data A-133 audits (FAC) D&B, Recovery Board SAM (CCR, EPLS) External Data A-133 audits (FAC) D&B, Recovery Board SAM (CCR, EPLS) Dr. Brett Baker (2012) Identification of Higher Risk Institutions and Transactions Dr. Brett Baker AIGA. NSF-OIG 13

14 Transaction Level Risk Indicators: Grant Transactions Cost transfers to other projects or contracts 27 Multiple payments of same invoice Excessive costs/large budget reallocations Multiple adjusting entries, end-of-grant spend-out Unallowable charges, charges after expiration Payroll Risk Indicators: Grantee Data 28 Payments after grant expiration Multiple labor categories for same employee Timesheets with signature differences Employee background, experience, or education does not meet requirements Fictitious employees, such as contractor s relatives 14

15 Anomalous Drawdown Patterns $$ Start up costs Drawdown Spike Extinguishing Remaining Grant funds (before expiration) Extinguishing Remaining Grant funds (after expiration) Normal drawdown pattern Grant Award Grant Expiration 29 Dr. Brett Baker AIGA. NSF-OIG Burn Rate Actual vs Expected 30 Actual Expected Award Amount ($K) Expended ($K) %Expend Award Days Days Active % Total Days Delta 1 10,000 9,000 90% % ,000 4,000 80% % ,000 1,500 75% % , % % ,000 12,000 60% % ,000 5,000 50% % 0.57 Awardee Totals 48,000 32,495 68% 7,302 3,997 55% would be normal 15

16 Award Burn Rate Profile Comparison 31 Example: Equipment Charges Incurred Immediately Before Grant Expiration Date 32 Same day as expiration 57 days before expiration 46 days before expiration 16

17 Travel Related to Award? 33 Just before award expiration Just after award expiration Purchase Card Oversight Using Data Analytics Government purchase card overview Simplified acquisition High risk for abuse without strong oversight Government Credit Card Fraud Prevention Act 2013 DoD joint purchase card review ( ) Current work at NSF 34 17

18 Review objective DoD Joint Purchase Card Review 35 Develop automated oversight capability to identify anomalies in purchase card data that may indicate fraud or abuse Improve field research, reporting, process for audit and investigation Universe reviewed 15 million purchase card transactions ($9 billion) 200,000 cardholders (CH) and 40,000 authorizing officials (AO) Subject matter expert conferences Structured brainstorming : 35 auditors, investigators, GSA officials Developed 115 indicators of potential fraud 46 codable Build targeted business rules to run against data 36 18

19 Top Indicator Combinations 97% Adult websites, Weekend/Holidays 67% Purchases from 1 vendor, CH=AO 57% Adult websites 57% Internet transactions, 3rd party billing 53% Interesting vendors, many transactions 43% Even dollars, near limit, same vendor, vendor business w/few CHs Current NSF Purchase Card Work 38 Approach Similar to DoD Joint Purchase Card Review Transaction Universe 3 years of purchase card activity 230 card holders 34,000 transactions $17 million Risk-based approach to testing Worked closely with Investigations Developed risk indicators (previous and new) 19

20 Risk Factor Flags Approving official has a span of control of 5 or more card holders (Risk value = 1) MCC Codes Transactions with Suspect MCC codes (Risk value = 2) Blocked MCC codes (Risk value = 3) 39 One to One Transactions in which the merchant did business only with that particular NSF card holder (Risk value = 2) Weekend and Holiday Purchases Transactions on Saturday, Sunday, Holidays (Risk value = 3) Risk Factor Flags - continued Possible Split Purchase Card holder has multiple purchases from the same merchant totaling more than $3,000 on the same day or within a few days (Risk value = 3) 40 Suspect Level 3 Data Transactions with Level 3 data deemed suspect, based on manual review. For example, possible personal purchase, possible split transaction, questionable legitimate business need. (Risk value = 3) 20

21 Example of Level 3 Data Future Opportunities For Automated Oversight Electronic Invoices and Receipts Debit Cards Funding agency can view transaction charges OIGs/Administrators can run analytics on the digital data Continuous Monitoring Grantee performs Agency performs Government-wide efforts 21

22 Questions? Dr. Brett M. Baker Assistant Inspector General for Audit National Science Foundation Office of Inspector General Phone:

Oversight using Data Analytics

Oversight using Data Analytics Oversight using Data Analytics MACPA Government and Not-for-Profit Conference April 17, 2015 Overview Data Analytics in Government Applications in Grant Oversight Applications in Purchase Card Oversight

More information

Your Analytics are Discovering Smoke

Your Analytics are Discovering Smoke Your Analytics are Discovering Smoke Where s the fire and how do you put it out Jamie Ralls, CFE, ACDA Ian Green, M.Econ, CFE, CGAP Oregon Audits Division COL Bill Kelley, Ret., CISA, CISM Senior Advisor

More information

Ten Payment Fraud Protections

Ten Payment Fraud Protections Ten Payment Fraud Protections 1. Payee Positive Pay a. Provided by banks b. Banks match check serial numbers and dollar amounts against a company provided list of checks issued and only pays those checks

More information

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES Page Analytic Name Split expenses TE Analytic 01 Same expense claimed by two or

More information

Can You Spot Fraudsters?

Can You Spot Fraudsters? Can You Spot Fraudsters? CACUBO Workshop March 22, 2018 Eric Conforti, CPA, CFE 1 Who Are We? A One-Firm Firm: Over 2,200 industry experts to partner with when specific industry knowledge is needed during

More information

Banking, Payroll and Purchase: investigating financial fraud with data analytics

Banking, Payroll and Purchase: investigating financial fraud with data analytics Banking, Payroll and Purchase: investigating financial fraud with data analytics 1 fraud investigations IDEA can be used to identify unusual and suspect transactions as part of a fraud investigation. There

More information

Using Data Analytics as a Management Tool to Identify Organizational Risks

Using Data Analytics as a Management Tool to Identify Organizational Risks 2013 CliftonLarsonAllen LLP Using Data Analytics as a Management Tool to Identify Organizational Risks Government Finance Officers Association of South Carolina October 13, 2014 cliftonlarsonallen.com

More information

MIS 5208 Week 2 Fraud Detection & Prevention

MIS 5208 Week 2 Fraud Detection & Prevention MIS 5208 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@temple.edu Fraud Awareness & Internal Controls Awareness Internal

More information

APPENDIX 2 COMMUNITY DEVELOPMENT COMMISSION FINANCIAL CHECKLIST REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER)

APPENDIX 2 COMMUNITY DEVELOPMENT COMMISSION FINANCIAL CHECKLIST REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER) REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER) AGENCY NAME: AGENCY ADDRESS AGENCY PHONE: DATE PREPARED: PREPARED BY: TITLE: EMAIL: AGENCY GENERAL INFORMATION EXECUTIVE DIRECTOR /CITY

More information

U.S. Bank Payment Analytics. Keys to Success. A more targeted, effi cient and effective way to monitor transactions

U.S. Bank Payment Analytics. Keys to Success. A more targeted, effi cient and effective way to monitor transactions U.S. Bank Payment Analytics Keys to Success A more targeted, effi cient and effective way to monitor transactions Overview Commercial cards are fast becoming the payment tool of choice for all types of

More information

Bookkeeping Foundations: Best Practices Church Accounting: Getting Off On the Right Foot E922

Bookkeeping Foundations: Best Practices Church Accounting: Getting Off On the Right Foot E922 Bookkeeping Foundations: Best Practices Church Accounting: Getting Off On the Right Foot E922 Bookkeeping Foundations: Presented by Bryan Baughman 2018 Shelby Systems, Inc. Other brand and product names

More information

Using Artificial Intelligence to Automate Expense Report Audit, Fraud Detection, and Risk Compliance

Using Artificial Intelligence to Automate Expense Report Audit, Fraud Detection, and Risk Compliance Using Artificial Intelligence to Automate Expense Report Audit, Fraud Detection, and Risk Compliance August 2016 Artificial Intelligence for Business Manual expense audit leaves companies vulnerable to

More information

Internal Control Checklist

Internal Control Checklist Instructions: The may be used to document a review of the existing procedures and activities that make up your internal control system, or serve as a guide in developing additional controls. The provides

More information

Contract and Procurement Fraud. Fraud in Procurement without Competition

Contract and Procurement Fraud. Fraud in Procurement without Competition Contract and Procurement Fraud Fraud in Procurement without Competition Sole-Source Awards Noncompetitive procurement process through the solicitation of only one source Procurement through sole-source

More information

Creating a Fraud Risk Assessment and Implementing a Continuous Monitoring Program. Christopher DiLorenzo, CFE, CPA, CIA, CRMA

Creating a Fraud Risk Assessment and Implementing a Continuous Monitoring Program. Christopher DiLorenzo, CFE, CPA, CIA, CRMA Creating a Fraud Risk Assessment and Implementing a Continuous Monitoring Program Christopher DiLorenzo, CFE, CPA, CIA, CRMA 2015 Association of Certified Fraud Examiners, Inc. Creating a Robust Fraud

More information

How to stop improper payments: A focus on government vendor risk

How to stop improper payments: A focus on government vendor risk How to stop improper payments: A focus on government vendor risk TODAY S SPEAKERS Nichole Gable SENIOR MANAGER KEARNEY & COMPANY Nonie Dalton SENIOR PRODUCT MANAGER, PUBLIC SECTOR, ACL IN TODAY S WEBINAR

More information

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement

More information

IIA Springfield IL Chapter

IIA Springfield IL Chapter Adding Value with Data Analytics IIA Springfield IL Chapter October 14, 2010 0 Jan Beckmann, CPA, ACL Certified Trainer, ACDA jbeckmann@bswllc.com 314.983.1254 1050 N. Lindbergh Blvd. St. Louis, Missouri

More information

6. Does your organization plan to use existing staff to manage t he AmeriCorps program? YES NO If so, provide name and title:

6. Does your organization plan to use existing staff to manage t he AmeriCorps program? YES NO If so, provide name and title: The information collected by this survey will be used by the Missouri Community Service Commission and/or the Corporation for National and Community Service exclusively as a tool to assess the capacity

More information

Seattle Public Schools The Office of Internal Audit

Seattle Public Schools The Office of Internal Audit Seattle Public Schools The Office of Internal Audit Internal Audit Report September 1, 2014 through Current Issue Date: June 21, 2016 Executive Summary Background Information The function is centralized

More information

Contract and Procurement Fraud

Contract and Procurement Fraud Contract and Procurement Fraud Fraud in Procurement Without Competition 2018 Association of Certified Fraud Examiners, Inc. Sole-Source Awards The procurement process is noncompetitive through the solicitation

More information

Using Transactional Analysis for

Using Transactional Analysis for Using Transactional Analysis for Effective Fraud Detection Date: 15 th January 2009 Nishith Seth Seth Services.P. Ltd. www.sspl.net.in Cost Indirect costs: image, morale Fraud Issues & Impact Direct costs:

More information

Your Streamlining Victories? Your Reality 4/22/2018. Streamlining Fiscal Systems

Your Streamlining Victories? Your Reality 4/22/2018. Streamlining Fiscal Systems Streamlining Fiscal Systems April 30, 2018 Tennessee Association of Community Action Discussion Leader: Kay Sohl Your Reality # staff? # funding agreements? # fiscal staff? # compliance officers QA staff?

More information

Find out the answers to the 11 most frequently asked questions from outside accountants and Certified Public Accountants who use Ajera.

Find out the answers to the 11 most frequently asked questions from outside accountants and Certified Public Accountants who use Ajera. Quick reference AJST10 Just the FAQs? for outside accountants and CPAs Find out the answers to the 11 most frequently asked questions from outside accountants and Certified Public Accountants who use Ajera.

More information

VOLUME 9 - Accounts Payable (Payment Management)

VOLUME 9 - Accounts Payable (Payment Management) Defense Finance and Accounting Service DFAS 7900.4 M Financial Requirements Manual Volume 9, (Payment Management) August 2014 Strategy, Policy and Requirements SUBJECT: Description of Requirement Changes

More information

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT Page Analytic Name Vendor bank details match employees bank details HR Analytic 01 Vendor

More information

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT Page Analytic Name Vendor bank details match employees bank details HR Analytic 01 Vendor

More information

Contract and Procurement Fraud

Contract and Procurement Fraud Contract and Procurement Fraud Performance Schemes 2018 Association of Certified Fraud Examiners, Inc. Invoicing Schemes Vendor submits fraudulent invoices to generate false payments. False invoices Inflated

More information

University of South Florida. Evaluation of Financial Management Systems and Financial Capability Questionnaire

University of South Florida. Evaluation of Financial Management Systems and Financial Capability Questionnaire University of South Florida Evaluation of Financial Management Systems and Financial Capability Questionnaire Subrecipient: Subaward #: DUNS # Organization Type: EIN/TIN# The purpose of this questionnaire

More information

9/15/2017. Automated Control Monitoring for Fraud, Waste and Abuse

9/15/2017. Automated Control Monitoring for Fraud, Waste and Abuse Automated Control Monitoring for Fraud, Waste and Abuse 1 Join the session in the AGA app to join polls and ask question Agenda Introductions DOS OIG Criminal Analysis Division & Analytics Florida IG Audience

More information

Detecting Fraud Through Data Analytics

Detecting Fraud Through Data Analytics Detecting Fraud Through Data Analytics Jeremy Clopton, CPA, CFE, ACDA Managing Consultant jclopton@bkd.com 417.865.8701 July 24, 2013 To Receive CPE Credit Participate in entire webinar Answer polls when

More information

AUDIT STATUS. Continuous Auditing Ideas and Priority Ranking Draft: 8/7/2012

AUDIT STATUS. Continuous Auditing Ideas and Priority Ranking Draft: 8/7/2012 Compliance Identify single day stays and subsequent re-admissions Identify inappropriate unbundling of lab tests Identify frequent use of high risk organizations Match OIG-excluded providers list with

More information

Single Audit Update: Internal Control over Compliance and the GAO s Green Book. MSBO s 80 th Annual Conference April 19, 2018

Single Audit Update: Internal Control over Compliance and the GAO s Green Book. MSBO s 80 th Annual Conference April 19, 2018 Single Audit Update: Internal Control over Compliance and the GAO s Green Book MSBO s 80 th Annual Conference April 19, 2018 Presented by: Stephen W. Blann, CPA, CGFM, CGMA Director of Governmental Audit

More information

Federal Fiscal Monitoring: Fostering Continuous Improvement

Federal Fiscal Monitoring: Fostering Continuous Improvement Federal Fiscal Monitoring: Fostering Continuous Improvement Title I New Director Training July 20, 2016 Division of School Business The most terrifying words in the English language are: I m from the government

More information

New Subrecipient Questionnaire

New Subrecipient Questionnaire New Subrecipient Questionnaire Accepting an award from The Johns Hopkins University (JHU) creates a legal duty for the subrecipient to use the funds according to the award agreement and applicable United

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

You can easily view comparative data and drill through for transaction details.

You can easily view comparative data and drill through for transaction details. analyzing financial and operational information (such as number of sales reps, occupancy rates or cycle time), giving you a very powerful business management tool that leverages your financial data. You

More information

Accounting Systems and Recordkeeping for A/E Firms ACEC/MD Small Business Enterprise Committee October 13, 2017

Accounting Systems and Recordkeeping for A/E Firms ACEC/MD Small Business Enterprise Committee October 13, 2017 Accounting Systems and Recordkeeping for A/E Firms ACEC/MD Small Business Enterprise Committee October 13, 2017 and Ron Grodzinsky At a Glance works with engineering firms with fees ranging from $2 million

More information

DIVISION OF VOCATIONAL REHABILITATION MEMORANDUM OF AGREEMENT COST REIMBURSEMENT REQUIREMENTS

DIVISION OF VOCATIONAL REHABILITATION MEMORANDUM OF AGREEMENT COST REIMBURSEMENT REQUIREMENTS DIVISION OF VOCATIONAL REHABILITATION MEMORANDUM OF AGREEMENT COST REIMBURSEMENT REQUIREMENTS May 12, 2008 1 THE BIG QUESTIONS WHAT WILL YOU NEED TO SUBMIT FOR REIMBURSEMENT PAYMENT? WILL IT TAKE LONGER

More information

VOLUME 9 - Accounts Payable (Payment Management)

VOLUME 9 - Accounts Payable (Payment Management) Defense Finance and Accounting Service DFAS 7900.4 M Financial Requirements Manual Volume 9, (Payment Management) August 2014 Strategy, Policy and Requirements SUBJECT: Description of Requirement Changes

More information

Data Analytics: Where Do I Start?

Data Analytics: Where Do I Start? Data Analytics: Where Do I Start? Ryan Merryman, CPA, CFF, CITP, CFE David Heneke, CPA, CISA Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered

More information

Your School District Procurement Card. Staff Guide Staff Agreement & Board Policy

Your School District Procurement Card. Staff Guide Staff Agreement & Board Policy Your School District Procurement Card Staff Guide Staff Agreement & Board Policy OVERVIEW The Procurement Card Program is intended to streamline and simplify the Procurement and Accounts Payable functions.

More information

What Happens When Internal Controls Fail

What Happens When Internal Controls Fail What Happens When Internal Controls Fail 1 Your Presenters Brian Sanvidge Principal Baker Tilly Ellen Labita Partner Baker Tilly Danielle Callaci Manager Baker Tilly 2 Today s Agenda > What are Internal

More information

DISTINGUISHING CHARACTERISTICS.

DISTINGUISHING CHARACTERISTICS. Classification Title: Accountant Department: Multiple EEO6 Code: 3 Employee Group: Classified Salary Grade: 32 Supervision Received From: An Assigned Administrator or Supervisor Date of Origin: 9/2016

More information

Business Requirements Definitions

Business Requirements Definitions Business Requirements s Department of Financial Services Date: 01/19/2017 Revision: Version 2.0 Table of Contents Overview... 3 Priority Field Values s... 4 Functional Requirements Categories... 5 Accounts

More information

Idaho PTE Business Education Course with Essential Learning Outcomes and Learning Indicators

Idaho PTE Business Education Course with Essential Learning Outcomes and Learning Indicators A course designed to emphasize accounting principles as they relate to the basic understanding and skills required in keeping manual and computerized financial records for a business. Emphasis is on providing

More information

Leveraging Data Analytics to Expand Audit Coverage and Add Organizational Value

Leveraging Data Analytics to Expand Audit Coverage and Add Organizational Value Leveraging Data Analytics to Expand Audit Coverage and Add Organizational Value Clint McPherson Managing Director, Dallas, TX Cindy Hart Manager, Dallas, TX Setting the Stage - Data Analysis Defined Data

More information

9/12/2013. CAPITALIZE ON YOUR PURCHASING CARD PROGRAM September 20, Agenda. With a card payment you can:

9/12/2013. CAPITALIZE ON YOUR PURCHASING CARD PROGRAM September 20, Agenda. With a card payment you can: CAPITALIZE ON YOUR PURCHASING CARD PROGRAM September 20, 2013 Agenda Why Use a Commercial Card? Review the benefits of a card solution Travel Cards Automate expense reporting and gain visibility into spend

More information

The Future of ACH is Here

The Future of ACH is Here The Future of ACH is Here Using and Enhancing Same Day ACH Michael Herd SVP, ACH Network Administration NACHA The Electronic Payments Association Lawrence Pannell, Jr. Senior Consultant, Finance Office

More information

HHS & NSF Audits of FDP Payroll Certification Pilots

HHS & NSF Audits of FDP Payroll Certification Pilots HHS & NSF Audits of FDP Payroll Certification Pilots Background - Audits HHS & NSF agreement with FDP & OMB to conduct audits at 4 FDP universities NSF: George Mason University (GMU), Michigan Technological

More information

LEASE ACCOUNTING AND YOUR OTHER FINANCIAL SYSTEMS THE ENTERPRISE SYSTEMS THAT TRACK LEASING DATA. Developed For:

LEASE ACCOUNTING AND YOUR OTHER FINANCIAL SYSTEMS THE ENTERPRISE SYSTEMS THAT TRACK LEASING DATA. Developed For: LEASE ACCOUNTING AND YOUR OTHER FINANCIAL SYSTEMS THE 10 ENTERPRISE SYSTEMS THAT TRACK LEASING DATA Developed For: TABLE OF CONTENTS 1 2 3 4 5 6 7 8 LEASING DATA ACROSS THE ENTERPRISE FINANCIAL SYSTEMS

More information

A. General Information

A. General Information Management Systems Questionnaire for Standard Cost Reimbursement Grants (Jan 2016) 1. Legal name of applicant organization: 2. Name and title of individual completing this questionnaire: 3. Signature of

More information

A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud

A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud July 2018 Greenlight Technologies. All rights reserved. 1 Speakers James Rice Vice President of Customer Solutions Greenlight

More information

Item # 6.1 ISC: UNRESTRICTED AC Attachment. Corporate Credit Card (Data Analytics) Audit

Item # 6.1 ISC: UNRESTRICTED AC Attachment. Corporate Credit Card (Data Analytics) Audit Corporate Credit Card (Data Analytics) Audit January 16, 2018 THIS PAGE LEFT INTENTIONALLY BLANK Table of Contents Executive Summary... 5 1.0 Background... 6 2.0 Audit Objectives, Scope and Approach...

More information

FEDERAL AWARD PROGRAMS INTERNAL CONTROL EVALUATION. Cross-cutting characteristics (generally applicable to all fourteen requirements)

FEDERAL AWARD PROGRAMS INTERNAL CONTROL EVALUATION. Cross-cutting characteristics (generally applicable to all fourteen requirements) NAME OF ENTITY YEAR END prep by FEDERAL AWARD PROGRAMS INTERNAL CONTROL EVALUATION The Single Audit Act requires the auditor to determine and report on whether an entity has internal controls that provide

More information

SEMtek. Introduction. SEMtek success story: University of Alabama at Tuscaloosa

SEMtek. Introduction. SEMtek success story: University of Alabama at Tuscaloosa SEMtek Since 1984, entrinsik has invested considerable time researching the seminar and event management industry, learning the business and developing software that would not only automate the process

More information

Detecting Fraud Through Vendor Audits

Detecting Fraud Through Vendor Audits Detecting Fraud Through Vendor Audits Identifying and Selecting Audit Candidates 2017 Association of Certified Fraud Examiners, Inc. The Importance of Routinely Exercising Vendor Audit Rights There is

More information

Forensic Data Analytics in the Payroll Environment. 6 September 2012

Forensic Data Analytics in the Payroll Environment. 6 September 2012 Forensic Data Analytics in the Payroll Environment 6 September 2012 Disclaimers The content of this presentation is for the purposes of providing the with information on forensic data analytics specific

More information

MAC CONTINUOUS AUDIT REPORT st QUARTER

MAC CONTINUOUS AUDIT REPORT st QUARTER Page 1 of 16 MEMORANDUM TO: Finance and Administration Committee FROM: Scott Zaczkowski, Director-Internal Audit (612-467-0526) SUBJECT: MAC CONTINUOUS AUDIT REPORT 2017 1st QUARTER DATE: July 17, 2017

More information

Material available on web at

Material available on web at Material available on web at http://gtumcain.wordpress.com Major topics Modules of ERP Human Resources Management Financial Management Inventory Management Quality Management Sales and Distribution (Murlidhar

More information

Subrecipient Invoice Checklist

Subrecipient Invoice Checklist Subrecipient Invoice Checklist Subrecipient: Purchase Order Number: High-Risk: Yes No Subrecipient Invoice Number: Cost Reimbursable Invoice: Low-Risk Criteria: Confirm invoice submission is in accordance

More information

Charges to sponsored projects are classified as either non-salary or salary.

Charges to sponsored projects are classified as either non-salary or salary. EXPENDITURE APPROVAL AND CONTROL INITIATING CHARGES TO SPONSORED PROJECTS Charges to sponsored projects are classified as either non-salary or salary. Non-salary charges are initiated via: 1. Pcard; 2.

More information

Using Data Analytics in Audits

Using Data Analytics in Audits Using Data Analytics in Audits Data Analytics is the process of inspecting, cleansing, transforming and modelling raw data with the purpose of discovering useful information, drawing conclusions and supporting

More information

Kuali and edata Glossary of Terms

Kuali and edata Glossary of Terms Kuali and edata Glossary of s Overview: This glossary is a compilation of the business and technical terminology relevant to the Kuali and edata. Purpose: The purpose of this glossary is to foster common

More information

5/14/2018. Billing and Revenue Integrity How Do We Effectively Audit or Monitor? Today s Agenda. What We Hear as the Revenue Integrity Program Goal

5/14/2018. Billing and Revenue Integrity How Do We Effectively Audit or Monitor? Today s Agenda. What We Hear as the Revenue Integrity Program Goal Billing and How Do We Effectively Audit or Monitor? Lori Laubach, CHC Partner Health Care Consulting Today s Agenda Definition of revenue integrity How is the Government looking at revenue integrity? Revenue

More information

Cash Reconciliations and Cash Handling

Cash Reconciliations and Cash Handling Cash Reconciliations and Cash Handling WASBO Accounting Conference March, 2016 Handling Cash Cash may be the most vulnerable asset in your LEA. How do you safeguard your cash? Timely reconciliation of

More information

Payables Management. 2 nd Edition. Steven M. Bragg

Payables Management. 2 nd Edition. Steven M. Bragg Payables Management 2 nd Edition Steven M. Bragg Chapter 1 Overview of Payables... 1 Learning Objectives... 1 Introduction... 1 Transaction Cycles... 1 Organizational Structure of the Accounting Department...

More information

CORP Appendix A CORPORATE POLICY. Attachments: Related Documents/Legislation: Revenue Administrative Policy

CORP Appendix A CORPORATE POLICY. Attachments: Related Documents/Legislation: Revenue Administrative Policy CORP2014-085 Appendix A CORPORATE POLICY Policy Title: Cash Handling Policy Policy Category: Financial Control Policy Policy No.: FC-016 Department: Corporate Services Approval Date: Revision Date: Author:

More information

Cash Disbursement Procedure

Cash Disbursement Procedure ACCOUNTING PROCEDURES Georgia Recreation and Park Association March 2015 Cash Disbursement Procedure The following Cash Disbursement Procedure is the responsibility of the GRPA Office Manager under the

More information

Federal Education Programs Financial Management Practices

Federal Education Programs Financial Management Practices Federal Education Programs Financial Management Practices Legal Structures for Federal Programs Statutes / Legislation Program Statues (NCLB, IDEA, Perkins) General Education Provisions Act (GEPA) Regulations

More information

Diocese of Covington Policies & Procedures Manual Section: Compliance Accounting Policy: Internal Control & Segregation of Duties

Diocese of Covington Policies & Procedures Manual Section: Compliance Accounting Policy: Internal Control & Segregation of Duties Internal Control refers to the policies and procedures established to provide reasonable assurance that parish assets are safeguarded, that accountability is achieved, and that errors in financial records

More information

Advanced Finance for Governing Board Members. Charter Schools: Advancing the Promise!! 2015 Annual Conference

Advanced Finance for Governing Board Members. Charter Schools: Advancing the Promise!! 2015 Annual Conference Advanced Finance for Governing Board Members Charter Schools: Advancing the Promise!! 2015 Annual Conference Governing Body Responsibilities with regard to finance Fiduciary responsibilities outlined in

More information

Financial Controls Checklist

Financial Controls Checklist Financial Controls Checklist Board of Health: Board of Health for the Leeds, Grenville & Lanark District Health Unit Period ended: Dec. 31/17 Objective: The objective of the Financial Controls Checklist

More information

FINANCE FUNCTION PROCESSES AND PERFORMANCE MEASURES

FINANCE FUNCTION PROCESSES AND PERFORMANCE MEASURES FINANCE FUNCTION PROCESSES AND PERFORMANCE MEASURES NOTE: The following material is intended to provide a brief overview of some finance function processes. This can be used as a high-level reference when

More information

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL Page Analytic Name Employee names on the payroll that match a vendor PR Analytic 01 Ex-employees

More information

Which of the following are subareas of the People Integration subcomponent of SAP NetWeaver?

Which of the following are subareas of the People Integration subcomponent of SAP NetWeaver? SAP EDUCATION SAMPLE QUESTIONS: C_TERP10_60 SAP Certified Business Associate with SAP ERP 6.0 print view Disclaimer: These sample questions are for self-evaluation purposes only and do not appear on the

More information

Emissions Reductions Alberta

Emissions Reductions Alberta Emissions Reductions Alberta Project Audit Expectations October 21, 2016 Emissions Reduction Alberta (ERA) is a legal trade name of the Climate Change and Emissions Management (CCEMC) Corporation. What

More information

Overview of Sampling and Single Audit Reporting Requirements

Overview of Sampling and Single Audit Reporting Requirements Governmental Audit Quality Center Overview of Sampling and Single Audit Reporting Requirements A Governmental Audit Quality Center Web Event Today s speakers Rachel Flanders, CPA, CliftonLarsonAllen Erica

More information

Analysis of Digital Financial Data

Analysis of Digital Financial Data From the SelectedWorks of Robert L Kardell August, 2011 Analysis of Digital Financial Data Robert L Kardell Available at: https://works.bepress.com/robert_kardell/6/ Analysis of Digital Financial Data

More information

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE

ACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE Page Analytic Name Duplicate payments AP Analytic 01 Duplicate invoices AP Analytic 02 Duplicate

More information

Senior Administrative Retreat. Overview of Financial Services Division July 14, 2017 Presented by Liz Metzger

Senior Administrative Retreat. Overview of Financial Services Division July 14, 2017 Presented by Liz Metzger Senior Administrative Retreat Overview of Financial Services Division July 14, 2017 Presented by Liz Metzger What Do We Do? Prepares the consolidated annual audit report each year Primary liaison with

More information

Guide for the Preservation of Records For Public Water Utilities

Guide for the Preservation of Records For Public Water Utilities Guide for the Preservation of Records For Public Water Utilities No. Types of Records Record Retention Corporate and General 1. Capital Stock Records:.. 2. Proxies and Voting Lists:... 3. Annual Report

More information

Northern Oklahoma College Tonkawa, Oklahoma

Northern Oklahoma College Tonkawa, Oklahoma Northern Oklahoma College Tonkawa, Oklahoma Internal Audit Report INTERNAL AUDIT REPORT Table of Contents Section Page Executive Summary of Procedures Performed and Results Thereof... I 1 Expenditures...

More information

Conducting Internal Investigations

Conducting Internal Investigations Conducting Internal Investigations Investigating Fraud Using Data Analytics 2018 Association of Certified Fraud Examiners, Inc. Data Analytics The use of analytics software to identify trends, patterns,

More information

Utilizing Technology in School Business Management

Utilizing Technology in School Business Management TITLE OF PRESENTATION Utilizing Technology in School Business Management LINE OF SUBTEXT & ADDITIONAL LINE September 2015 TITLE OF PRESENTATION Favorites TITLE OF PRESENTATION Favorite 1 TITLE OF PRESENTATIONSave

More information

SAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM

SAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM SAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM FINANCIAL PROCEDURES MANUAL Table of Contents GENERAL ACCOUNTING POLICY AND PROCEDURES... 3 OVERALL ACCOUNTING SYSTEM DESIGN... 3 CONTROL OBJECTIVE...

More information

FINANCIAL SERVICES DEPARTMENT Strategic Business Plan

FINANCIAL SERVICES DEPARTMENT Strategic Business Plan FINANCIAL SERVICES DEPARTMENT Strategic Business Plan Mission The mission of the Financial Services Department is to provide compliant accounting, cash management, purchasing, and payment services to City

More information

U.S. Bank Access Online

U.S. Bank Access Online U.S. Bank Access Online Overview U.S. Bank Access Online provides organizations with real time access to their commercial card programs anywhere, anytime, within a secured environment. This powerful proprietary

More information

Detecting & Preventing Procurement Fraud Using Data Analysis to Detect Improper Disbursements

Detecting & Preventing Procurement Fraud Using Data Analysis to Detect Improper Disbursements Detecting & Preventing Procurement Fraud Using Data Analysis to Detect Improper Disbursements April 29, 2014 2:00 3:00pm ET Andrew Simpson, MBA Chief Operating Officer, CaseWare Analytics Paul Soos, CFE,

More information

Managing Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970)

Managing Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970) Managing Fraud Risks in Procurement & Contacting The IIA Los Angeles Chapter October 2, 2017 John J. Hall, CPA (970) 926-0355 John@JohnHallSpeaker.com 1 Four Categories 1. Theft 2. Results Manipulation

More information

Internal Control Questionnaire

Internal Control Questionnaire Internal Control Questionnaire CASH RECEIPTS/SALE QUESTIONS: 1. Is there a designated cash receipt custodian? 2. Are all receipts recorded on pre-numbered cash receipts tickets, including those received

More information

FRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies

FRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies Proactive Fraud Auditing End of Chapter 4 in Albrecht FRAUD DETECTION Recognizing the Symptoms of Fraud Actg 537 Identify Risk Exposures 1 2 Identify Fraud Symptoms for Each Exposure Proactively Look for

More information

Audit Department Report for June 2014

Audit Department Report for June 2014 Report Report Office of the General Auditor Audit Department Report for June 2014 Summary Three reports were issued during the month: Gas Card Program Audit Report and Management Response ABSG Consulting,

More information

3.09. Ontario Power Generation Acquisition of Goods and Services. Chapter 3 Section. Background

3.09. Ontario Power Generation Acquisition of Goods and Services. Chapter 3 Section. Background Chapter 3 Section 3.09 Ontario Power Generation Acquisition of Goods and Services Chapter 3 VFM Section 3.09 Background As part of the reorganization of Ontario Hydro, Ontario Power Generation (OPG) was

More information

The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions

The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Technology for Business Assurance The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application

More information

Federal Acquisition Service

Federal Acquisition Service U.S. General Services Administration Federal Acquisition Service GSA SmartPay Fleet Management Essentials Varuna Singh Center of Charge Card Management General Services Administration 2017 Fed Fleet Forum

More information

Elavon Financial Services Visa Acquisition Card

Elavon Financial Services Visa Acquisition Card GOVERNMENT SERVICES Elavon Financial Services Visa Acquisition Card Overview As a leading payments provider, Elavon Financial Services is committed to collaborating with its federal government partners

More information

Use of Forensic Data Analytics in Investigations. Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN

Use of Forensic Data Analytics in Investigations. Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN Use of Forensic Data Analytics in Investigations Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN gerry.zack@corporatecompliance.org Today s Agenda 1. A framework for using analytics in compliance

More information

3/28/2016. Compliance and Operational Risk Management using Data Analytics. Agenda. ACL History. ACL Today. ACL is growing. What is data-driven GRC?

3/28/2016. Compliance and Operational Risk Management using Data Analytics. Agenda. ACL History. ACL Today. ACL is growing. What is data-driven GRC? Agenda Compliance and Operational Risk Management using Data Analytics Presenters: Scott Robinson Account Executive, ACL Public Sector Mark Swann Metropolitan Auditor, Metropolitan Government of Nashville

More information

SIGAR JULY. Special Inspector General for Afghanistan Reconstruction

SIGAR JULY. Special Inspector General for Afghanistan Reconstruction SIGAR Special Inspector General for Afghanistan Reconstruction SIGAR Financial Audit 13-11 Department of State s Afghanistan Media Project: Audit of Incurred Costs by HUDA Development Organization Afghanistan

More information