Predictive Analysis Risk Analysis
|
|
- Mercy Cook
- 6 years ago
- Views:
Transcription
1 Predictive Analysis Risk Analysis MARYLAND ASSOCIATION OF CPAS GOVERNMENT AND NOT-FOR-PROFIT CONFERENCE April 25, 2014 Overview Forensic Audit and Automated Oversight Data Analytics for Grant Oversight Data Analytics for Purchase Card 1
2 Forensic Audit Definition of Forensic Audit Audit that looks for financial misconduct, abuse, or wasteful activity More than Computer Assisted Audit Techniques (CAATs) Creates Relationships, Checks Calculations, Performs Comparisons Assess limitless number of analytical relationships Summarize large volume of data Database comparison 3 Automated Oversight More efficient use of resources 100% transaction review Still use traditional audit techniques to test transactions Opportunities to enhance oversight with less resources Improved risk identification Business rules based on risks Focus review on higher risks Recipients can use similar data analytics techniques Monitor grant spending Identify anomalies early 2
3 Data Versus Information An Endless Maze of Data... but No Information Different Levels of Knowledge Data Facts, numbers Information Summary Reports ACL, IDEA, Access Knowledge Descriptive Analytics SAS, SPSS, ACL, IDEA Wisdom Predictive Analytics Modeler Intelligent Miner Enterprise Miner NSF OIG does not endorse commercial products 3
4 Forensic Audit Approach Audit objectives and audit universe Structured brainstorming Consider Subject Matter Expert (SME) conference Identify indicators of potential fraud and ways to find in data Process to identify financial risks capture all ideas Map out the end-to-end process Identify systems and key processes Identify key controls Identify and obtain transaction-level data Record layout 1000 record dump ACL, IDEA, and Monarch can read virtually any data format Flat files, Delimited files, Dbase files, MS Access, Report files,. No file size limits Build targeted business rules and run against data Examine anomalies, work with investigations NSF OIG does not endorse commercial products Hardware Hardware and Software Applications SQL servers Mainframe (QMF) Docking stations Terminal server Software Applications Data mining and predictive analytics, e.g., Clementine Data interrogation e.g., ACL, IDEA, MS Access, Excel Statistical analysis e.g., SPSS and SAS Link analysis I2 Lexis-Nexis Data conversion utilities (Monarch) Internet, open-source research Access to system query tools NSF OIG does not endorse commercial products 4
5 Framework for End-to-End Payment Oversight A Data Analytics Approach Accounting Entitlement Grant Award Contracting Personnel Social Security, Medicare, Medicaid Medical Claims Electronic Fund Request SAM Electronic Invoice Paper Invoice Civilian, Military, Retiree Travel Claims Insurance Claims Award level Data: DUNS, CAGE, Institution ID, Award No., Award Amount Match databases with key fields (awardee IDs) Apply risk indicators to each payment record Summarize risks by awardee (award level risk) Direct Payment Loan Payment Grant Payment Contract Payment Transportation Purchase Card People Travel Payment Insurance Payment Continuous auditing Quick response and ad hoc Disbursing Federal Reserve ACH System Fedwire Transaction level Data: Payee, Institution ID, Award No., Invoice No., Payment Amt, Date, Bank Acct Data Analytics Identify high risk institutions or payees Identify high risk programs Surface questionable payments $$ Treasury Check Commercial Bank Oversight Review by GATB Auditors Investigators Agencies GuideStar (non profits) IRS 990 Federal Audit Clearinghouse Dunn and Bradstreet Master Death File (SSA) Do Not Pay (Treasury) that can help validate transactions and identify awardee and program risk CPARS, FPDS Brett Baker AIGA, NSF OIG Data Analytics: Myths and Realities MYTHS Data only, no fieldwork Numbers exercise Process changes data Findings unsupported Not auditing REALITIES Focuses fieldwork Source data not changed Traditional techniques still test support Findings have stronger support Yellow Book Compliance 5
6 Data Analytics Help. Determine reliability data fields Shape of the data (statistics) Completeness of transactions and fields Show anomalies Within a database Between databases Changes in behavior over time Develop risk profiles for comparisons Awardee profiles Award-type profiles Program profiles Common Data Analytics Tests Join Summarization Computed fields Blank fields (noteworthy if field is mandatory) Invalid dates Bounds testing Completeness Invalid codes Unreliable computed fields Illogical field relationships Trend analysis Duplicates 6
7 Data Analysis Fosters Creativity Can examine all records, not just a sample Tests not limited to What technical staff provides Predetermined data formats and/or relationships Can create relationships, check calculations, and perform comparisons Assess limitless analytical relationships Within large databases Comparing large databases Identifies anomalies Useful to identify misappropriation of assets and fraudulent financial reporting What is Data Mining? Refers to the use of machine learning and statistical analysis to find patterns in data sets. If you know exactly what you are looking for, use structured query language (SQL) If you only know vaguely what you are looking for, turn to data mining Most often used in marketing and customer analysis (until recently) 7
8 Methods of Data Mining Supervised modeling Predict patterns in data based on patterns of known information Decision trees Neural networks Unsupervised modeling Identify anomalies or outliers based on grouping similar transactions Kohonen Networks K-Means Clusters Control Charts 8
9 Comparing Data Files (Three Bucket Theory) Vendors Not Paid Yet Vendors Paid and In Vendor Table Vendors Paid but not In Vendor Table Vendor Table Disbursing Transactions Normal Distribution Anomalous Activity Normal Activity Anomalous Activity 9
10 Building a Forensic Capability Develop organizational capability All audit staff should have basic skill with data analysis tools Access to internal and external data Targeted audits are more efficient in time and cost Phased development Hardware and software Staff: system savvy, analytical, business process knowledge Training, then immediate application to work Forensic audit units perform more sophisticated analyses Tone at the top is an important component U.S. Financial Assistance Overview $550 billion in awards 88,000 awardees and 26 Federal grant making agencies Project and research, block, and formula Outcomes promote public good Challenges Limited visibility of how Federal funds are spent by awardees Support for funding requests is much less than for contracts American Recovery and Reinvestment Act (2009) $840 billion of assistance to stimulate the economy Greater accountability and transparency over spending than ever 10
11 Grants Differ From Contracts GRANTS Promote services for the public good Merit review (competitive) Multiple awardees Award budget No government ownership Grant payments Summary drawdowns No invoices for claims Expenditures not easily visible Salary percentages CONTRACTS Specified deliverables (Goods and Services) Competitive process One awardee Contract price Government ownership Contract payments Itemized payment requests Invoices to support claims Detailed costs Salary hourly rates Framework for Grant Oversight Data analytics-driven, risk-based methodology to improve oversight Identify institutions that may not use Federal funds properly Techniques to surface questionable expenditures Life cycle approach to oversight Mapping of end-to-end process to identify controls 100% review of key financial and program information Focus attention to award and expenditure anomalies Complements traditional oversight approaches Techniques to review process and transactions are similar Transactions of questionable activities are targeted 11
12 End to End Process for Grant Oversight 6 PRE-AWARD RISKS Funding Over Time Conflict of Interest False Statements False Certifications Duplicate Funding Inflated Budgets Candidate Suspended/Debarred ACTIVE AWARD RISKS Unallowable, Unallocable, Unreasonable Costs Inadequate Documentation General Ledger Differs from Draw Amount Burn Rate No /Late/Inadequate Reports Sub-awards, Consultants, Contracts Duplicate Payments Excess Cash on Hand/Cost transfers Unreported Program Income AWARD END RISKS No /Late Final Reports Cost Transfers Spend-out Financial Adjustments Unmet Cost Share Dr. Brett M. Baker, 2010 Data Sources Internal Proposals: budgets, panel scores Agency award systems, recipient reporting External Excluded Parties List System (EPLS) Central Contractor Registration (CCR/SAM) Public tax filings Federal Audit Clearinghouse (A-133 audits) Recipient financial system records General ledger and subsidiary ledgers Effort reporting Property Travel and purchase card Subaward monitoring 12
13 Risk Assessment and Identification of Questionable Transactions Phase I Identify High Risk Institutions Phase II Identify Questionable Expenditures Agency Award Data Award proposals Quarterly expense reports Cash draw downs Agency Award Data Award proposals Quarterly expense reports Cash draw downs Awardee Transaction Data General ledger Subsidiary ledgers Subaward data Data Analytics Continuous monitoring of grant awards and recipients Data Analytics Apply risk indicators to GL data and compare to Agency data Review Questionable Transactions External Data A-133 audits (FAC) D&B, Recovery Board SAM (CCR, EPLS) External Data A-133 audits (FAC) D&B, Recovery Board SAM (CCR, EPLS) Dr. Brett Baker (2012) Identification of Higher Risk Institutions and Transactions Dr. Brett Baker AIGA. NSF-OIG 13
14 Transaction Level Risk Indicators: Grant Transactions Cost transfers to other projects or contracts 27 Multiple payments of same invoice Excessive costs/large budget reallocations Multiple adjusting entries, end-of-grant spend-out Unallowable charges, charges after expiration Payroll Risk Indicators: Grantee Data 28 Payments after grant expiration Multiple labor categories for same employee Timesheets with signature differences Employee background, experience, or education does not meet requirements Fictitious employees, such as contractor s relatives 14
15 Anomalous Drawdown Patterns $$ Start up costs Drawdown Spike Extinguishing Remaining Grant funds (before expiration) Extinguishing Remaining Grant funds (after expiration) Normal drawdown pattern Grant Award Grant Expiration 29 Dr. Brett Baker AIGA. NSF-OIG Burn Rate Actual vs Expected 30 Actual Expected Award Amount ($K) Expended ($K) %Expend Award Days Days Active % Total Days Delta 1 10,000 9,000 90% % ,000 4,000 80% % ,000 1,500 75% % , % % ,000 12,000 60% % ,000 5,000 50% % 0.57 Awardee Totals 48,000 32,495 68% 7,302 3,997 55% would be normal 15
16 Award Burn Rate Profile Comparison 31 Example: Equipment Charges Incurred Immediately Before Grant Expiration Date 32 Same day as expiration 57 days before expiration 46 days before expiration 16
17 Travel Related to Award? 33 Just before award expiration Just after award expiration Purchase Card Oversight Using Data Analytics Government purchase card overview Simplified acquisition High risk for abuse without strong oversight Government Credit Card Fraud Prevention Act 2013 DoD joint purchase card review ( ) Current work at NSF 34 17
18 Review objective DoD Joint Purchase Card Review 35 Develop automated oversight capability to identify anomalies in purchase card data that may indicate fraud or abuse Improve field research, reporting, process for audit and investigation Universe reviewed 15 million purchase card transactions ($9 billion) 200,000 cardholders (CH) and 40,000 authorizing officials (AO) Subject matter expert conferences Structured brainstorming : 35 auditors, investigators, GSA officials Developed 115 indicators of potential fraud 46 codable Build targeted business rules to run against data 36 18
19 Top Indicator Combinations 97% Adult websites, Weekend/Holidays 67% Purchases from 1 vendor, CH=AO 57% Adult websites 57% Internet transactions, 3rd party billing 53% Interesting vendors, many transactions 43% Even dollars, near limit, same vendor, vendor business w/few CHs Current NSF Purchase Card Work 38 Approach Similar to DoD Joint Purchase Card Review Transaction Universe 3 years of purchase card activity 230 card holders 34,000 transactions $17 million Risk-based approach to testing Worked closely with Investigations Developed risk indicators (previous and new) 19
20 Risk Factor Flags Approving official has a span of control of 5 or more card holders (Risk value = 1) MCC Codes Transactions with Suspect MCC codes (Risk value = 2) Blocked MCC codes (Risk value = 3) 39 One to One Transactions in which the merchant did business only with that particular NSF card holder (Risk value = 2) Weekend and Holiday Purchases Transactions on Saturday, Sunday, Holidays (Risk value = 3) Risk Factor Flags - continued Possible Split Purchase Card holder has multiple purchases from the same merchant totaling more than $3,000 on the same day or within a few days (Risk value = 3) 40 Suspect Level 3 Data Transactions with Level 3 data deemed suspect, based on manual review. For example, possible personal purchase, possible split transaction, questionable legitimate business need. (Risk value = 3) 20
21 Example of Level 3 Data Future Opportunities For Automated Oversight Electronic Invoices and Receipts Debit Cards Funding agency can view transaction charges OIGs/Administrators can run analytics on the digital data Continuous Monitoring Grantee performs Agency performs Government-wide efforts 21
22 Questions? Dr. Brett M. Baker Assistant Inspector General for Audit National Science Foundation Office of Inspector General Phone:
Oversight using Data Analytics
Oversight using Data Analytics MACPA Government and Not-for-Profit Conference April 17, 2015 Overview Data Analytics in Government Applications in Grant Oversight Applications in Purchase Card Oversight
More informationYour Analytics are Discovering Smoke
Your Analytics are Discovering Smoke Where s the fire and how do you put it out Jamie Ralls, CFE, ACDA Ian Green, M.Econ, CFE, CGAP Oregon Audits Division COL Bill Kelley, Ret., CISA, CISM Senior Advisor
More informationTen Payment Fraud Protections
Ten Payment Fraud Protections 1. Payee Positive Pay a. Provided by banks b. Banks match check serial numbers and dollar amounts against a company provided list of checks issued and only pays those checks
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES Page Analytic Name Split expenses TE Analytic 01 Same expense claimed by two or
More informationCan You Spot Fraudsters?
Can You Spot Fraudsters? CACUBO Workshop March 22, 2018 Eric Conforti, CPA, CFE 1 Who Are We? A One-Firm Firm: Over 2,200 industry experts to partner with when specific industry knowledge is needed during
More informationBanking, Payroll and Purchase: investigating financial fraud with data analytics
Banking, Payroll and Purchase: investigating financial fraud with data analytics 1 fraud investigations IDEA can be used to identify unusual and suspect transactions as part of a fraud investigation. There
More informationUsing Data Analytics as a Management Tool to Identify Organizational Risks
2013 CliftonLarsonAllen LLP Using Data Analytics as a Management Tool to Identify Organizational Risks Government Finance Officers Association of South Carolina October 13, 2014 cliftonlarsonallen.com
More informationMIS 5208 Week 2 Fraud Detection & Prevention
MIS 5208 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@temple.edu Fraud Awareness & Internal Controls Awareness Internal
More informationAPPENDIX 2 COMMUNITY DEVELOPMENT COMMISSION FINANCIAL CHECKLIST REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER)
REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER) AGENCY NAME: AGENCY ADDRESS AGENCY PHONE: DATE PREPARED: PREPARED BY: TITLE: EMAIL: AGENCY GENERAL INFORMATION EXECUTIVE DIRECTOR /CITY
More informationU.S. Bank Payment Analytics. Keys to Success. A more targeted, effi cient and effective way to monitor transactions
U.S. Bank Payment Analytics Keys to Success A more targeted, effi cient and effective way to monitor transactions Overview Commercial cards are fast becoming the payment tool of choice for all types of
More informationBookkeeping Foundations: Best Practices Church Accounting: Getting Off On the Right Foot E922
Bookkeeping Foundations: Best Practices Church Accounting: Getting Off On the Right Foot E922 Bookkeeping Foundations: Presented by Bryan Baughman 2018 Shelby Systems, Inc. Other brand and product names
More informationUsing Artificial Intelligence to Automate Expense Report Audit, Fraud Detection, and Risk Compliance
Using Artificial Intelligence to Automate Expense Report Audit, Fraud Detection, and Risk Compliance August 2016 Artificial Intelligence for Business Manual expense audit leaves companies vulnerable to
More informationInternal Control Checklist
Instructions: The may be used to document a review of the existing procedures and activities that make up your internal control system, or serve as a guide in developing additional controls. The provides
More informationContract and Procurement Fraud. Fraud in Procurement without Competition
Contract and Procurement Fraud Fraud in Procurement without Competition Sole-Source Awards Noncompetitive procurement process through the solicitation of only one source Procurement through sole-source
More informationCreating a Fraud Risk Assessment and Implementing a Continuous Monitoring Program. Christopher DiLorenzo, CFE, CPA, CIA, CRMA
Creating a Fraud Risk Assessment and Implementing a Continuous Monitoring Program Christopher DiLorenzo, CFE, CPA, CIA, CRMA 2015 Association of Certified Fraud Examiners, Inc. Creating a Robust Fraud
More informationHow to stop improper payments: A focus on government vendor risk
How to stop improper payments: A focus on government vendor risk TODAY S SPEAKERS Nichole Gable SENIOR MANAGER KEARNEY & COMPANY Nonie Dalton SENIOR PRODUCT MANAGER, PUBLIC SECTOR, ACL IN TODAY S WEBINAR
More informationFRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS
FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement
More informationIIA Springfield IL Chapter
Adding Value with Data Analytics IIA Springfield IL Chapter October 14, 2010 0 Jan Beckmann, CPA, ACL Certified Trainer, ACDA jbeckmann@bswllc.com 314.983.1254 1050 N. Lindbergh Blvd. St. Louis, Missouri
More information6. Does your organization plan to use existing staff to manage t he AmeriCorps program? YES NO If so, provide name and title:
The information collected by this survey will be used by the Missouri Community Service Commission and/or the Corporation for National and Community Service exclusively as a tool to assess the capacity
More informationSeattle Public Schools The Office of Internal Audit
Seattle Public Schools The Office of Internal Audit Internal Audit Report September 1, 2014 through Current Issue Date: June 21, 2016 Executive Summary Background Information The function is centralized
More informationContract and Procurement Fraud
Contract and Procurement Fraud Fraud in Procurement Without Competition 2018 Association of Certified Fraud Examiners, Inc. Sole-Source Awards The procurement process is noncompetitive through the solicitation
More informationUsing Transactional Analysis for
Using Transactional Analysis for Effective Fraud Detection Date: 15 th January 2009 Nishith Seth Seth Services.P. Ltd. www.sspl.net.in Cost Indirect costs: image, morale Fraud Issues & Impact Direct costs:
More informationYour Streamlining Victories? Your Reality 4/22/2018. Streamlining Fiscal Systems
Streamlining Fiscal Systems April 30, 2018 Tennessee Association of Community Action Discussion Leader: Kay Sohl Your Reality # staff? # funding agreements? # fiscal staff? # compliance officers QA staff?
More informationFind out the answers to the 11 most frequently asked questions from outside accountants and Certified Public Accountants who use Ajera.
Quick reference AJST10 Just the FAQs? for outside accountants and CPAs Find out the answers to the 11 most frequently asked questions from outside accountants and Certified Public Accountants who use Ajera.
More informationVOLUME 9 - Accounts Payable (Payment Management)
Defense Finance and Accounting Service DFAS 7900.4 M Financial Requirements Manual Volume 9, (Payment Management) August 2014 Strategy, Policy and Requirements SUBJECT: Description of Requirement Changes
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT Page Analytic Name Vendor bank details match employees bank details HR Analytic 01 Vendor
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT Page Analytic Name Vendor bank details match employees bank details HR Analytic 01 Vendor
More informationContract and Procurement Fraud
Contract and Procurement Fraud Performance Schemes 2018 Association of Certified Fraud Examiners, Inc. Invoicing Schemes Vendor submits fraudulent invoices to generate false payments. False invoices Inflated
More informationUniversity of South Florida. Evaluation of Financial Management Systems and Financial Capability Questionnaire
University of South Florida Evaluation of Financial Management Systems and Financial Capability Questionnaire Subrecipient: Subaward #: DUNS # Organization Type: EIN/TIN# The purpose of this questionnaire
More information9/15/2017. Automated Control Monitoring for Fraud, Waste and Abuse
Automated Control Monitoring for Fraud, Waste and Abuse 1 Join the session in the AGA app to join polls and ask question Agenda Introductions DOS OIG Criminal Analysis Division & Analytics Florida IG Audience
More informationDetecting Fraud Through Data Analytics
Detecting Fraud Through Data Analytics Jeremy Clopton, CPA, CFE, ACDA Managing Consultant jclopton@bkd.com 417.865.8701 July 24, 2013 To Receive CPE Credit Participate in entire webinar Answer polls when
More informationAUDIT STATUS. Continuous Auditing Ideas and Priority Ranking Draft: 8/7/2012
Compliance Identify single day stays and subsequent re-admissions Identify inappropriate unbundling of lab tests Identify frequent use of high risk organizations Match OIG-excluded providers list with
More informationSingle Audit Update: Internal Control over Compliance and the GAO s Green Book. MSBO s 80 th Annual Conference April 19, 2018
Single Audit Update: Internal Control over Compliance and the GAO s Green Book MSBO s 80 th Annual Conference April 19, 2018 Presented by: Stephen W. Blann, CPA, CGFM, CGMA Director of Governmental Audit
More informationFederal Fiscal Monitoring: Fostering Continuous Improvement
Federal Fiscal Monitoring: Fostering Continuous Improvement Title I New Director Training July 20, 2016 Division of School Business The most terrifying words in the English language are: I m from the government
More informationNew Subrecipient Questionnaire
New Subrecipient Questionnaire Accepting an award from The Johns Hopkins University (JHU) creates a legal duty for the subrecipient to use the funds according to the award agreement and applicable United
More informationUsing Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
More informationYou can easily view comparative data and drill through for transaction details.
analyzing financial and operational information (such as number of sales reps, occupancy rates or cycle time), giving you a very powerful business management tool that leverages your financial data. You
More informationAccounting Systems and Recordkeeping for A/E Firms ACEC/MD Small Business Enterprise Committee October 13, 2017
Accounting Systems and Recordkeeping for A/E Firms ACEC/MD Small Business Enterprise Committee October 13, 2017 and Ron Grodzinsky At a Glance works with engineering firms with fees ranging from $2 million
More informationDIVISION OF VOCATIONAL REHABILITATION MEMORANDUM OF AGREEMENT COST REIMBURSEMENT REQUIREMENTS
DIVISION OF VOCATIONAL REHABILITATION MEMORANDUM OF AGREEMENT COST REIMBURSEMENT REQUIREMENTS May 12, 2008 1 THE BIG QUESTIONS WHAT WILL YOU NEED TO SUBMIT FOR REIMBURSEMENT PAYMENT? WILL IT TAKE LONGER
More informationVOLUME 9 - Accounts Payable (Payment Management)
Defense Finance and Accounting Service DFAS 7900.4 M Financial Requirements Manual Volume 9, (Payment Management) August 2014 Strategy, Policy and Requirements SUBJECT: Description of Requirement Changes
More informationData Analytics: Where Do I Start?
Data Analytics: Where Do I Start? Ryan Merryman, CPA, CFF, CITP, CFE David Heneke, CPA, CISA Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered
More informationYour School District Procurement Card. Staff Guide Staff Agreement & Board Policy
Your School District Procurement Card Staff Guide Staff Agreement & Board Policy OVERVIEW The Procurement Card Program is intended to streamline and simplify the Procurement and Accounts Payable functions.
More informationWhat Happens When Internal Controls Fail
What Happens When Internal Controls Fail 1 Your Presenters Brian Sanvidge Principal Baker Tilly Ellen Labita Partner Baker Tilly Danielle Callaci Manager Baker Tilly 2 Today s Agenda > What are Internal
More informationDISTINGUISHING CHARACTERISTICS.
Classification Title: Accountant Department: Multiple EEO6 Code: 3 Employee Group: Classified Salary Grade: 32 Supervision Received From: An Assigned Administrator or Supervisor Date of Origin: 9/2016
More informationBusiness Requirements Definitions
Business Requirements s Department of Financial Services Date: 01/19/2017 Revision: Version 2.0 Table of Contents Overview... 3 Priority Field Values s... 4 Functional Requirements Categories... 5 Accounts
More informationIdaho PTE Business Education Course with Essential Learning Outcomes and Learning Indicators
A course designed to emphasize accounting principles as they relate to the basic understanding and skills required in keeping manual and computerized financial records for a business. Emphasis is on providing
More informationLeveraging Data Analytics to Expand Audit Coverage and Add Organizational Value
Leveraging Data Analytics to Expand Audit Coverage and Add Organizational Value Clint McPherson Managing Director, Dallas, TX Cindy Hart Manager, Dallas, TX Setting the Stage - Data Analysis Defined Data
More information9/12/2013. CAPITALIZE ON YOUR PURCHASING CARD PROGRAM September 20, Agenda. With a card payment you can:
CAPITALIZE ON YOUR PURCHASING CARD PROGRAM September 20, 2013 Agenda Why Use a Commercial Card? Review the benefits of a card solution Travel Cards Automate expense reporting and gain visibility into spend
More informationThe Future of ACH is Here
The Future of ACH is Here Using and Enhancing Same Day ACH Michael Herd SVP, ACH Network Administration NACHA The Electronic Payments Association Lawrence Pannell, Jr. Senior Consultant, Finance Office
More informationHHS & NSF Audits of FDP Payroll Certification Pilots
HHS & NSF Audits of FDP Payroll Certification Pilots Background - Audits HHS & NSF agreement with FDP & OMB to conduct audits at 4 FDP universities NSF: George Mason University (GMU), Michigan Technological
More informationLEASE ACCOUNTING AND YOUR OTHER FINANCIAL SYSTEMS THE ENTERPRISE SYSTEMS THAT TRACK LEASING DATA. Developed For:
LEASE ACCOUNTING AND YOUR OTHER FINANCIAL SYSTEMS THE 10 ENTERPRISE SYSTEMS THAT TRACK LEASING DATA Developed For: TABLE OF CONTENTS 1 2 3 4 5 6 7 8 LEASING DATA ACROSS THE ENTERPRISE FINANCIAL SYSTEMS
More informationA. General Information
Management Systems Questionnaire for Standard Cost Reimbursement Grants (Jan 2016) 1. Legal name of applicant organization: 2. Name and title of individual completing this questionnaire: 3. Signature of
More informationA Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud
A Financial Executive s Guide to Internal Controls & Fraud Prevention in the Cloud July 2018 Greenlight Technologies. All rights reserved. 1 Speakers James Rice Vice President of Customer Solutions Greenlight
More informationItem # 6.1 ISC: UNRESTRICTED AC Attachment. Corporate Credit Card (Data Analytics) Audit
Corporate Credit Card (Data Analytics) Audit January 16, 2018 THIS PAGE LEFT INTENTIONALLY BLANK Table of Contents Executive Summary... 5 1.0 Background... 6 2.0 Audit Objectives, Scope and Approach...
More informationFEDERAL AWARD PROGRAMS INTERNAL CONTROL EVALUATION. Cross-cutting characteristics (generally applicable to all fourteen requirements)
NAME OF ENTITY YEAR END prep by FEDERAL AWARD PROGRAMS INTERNAL CONTROL EVALUATION The Single Audit Act requires the auditor to determine and report on whether an entity has internal controls that provide
More informationSEMtek. Introduction. SEMtek success story: University of Alabama at Tuscaloosa
SEMtek Since 1984, entrinsik has invested considerable time researching the seminar and event management industry, learning the business and developing software that would not only automate the process
More informationDetecting Fraud Through Vendor Audits
Detecting Fraud Through Vendor Audits Identifying and Selecting Audit Candidates 2017 Association of Certified Fraud Examiners, Inc. The Importance of Routinely Exercising Vendor Audit Rights There is
More informationForensic Data Analytics in the Payroll Environment. 6 September 2012
Forensic Data Analytics in the Payroll Environment 6 September 2012 Disclaimers The content of this presentation is for the purposes of providing the with information on forensic data analytics specific
More informationMAC CONTINUOUS AUDIT REPORT st QUARTER
Page 1 of 16 MEMORANDUM TO: Finance and Administration Committee FROM: Scott Zaczkowski, Director-Internal Audit (612-467-0526) SUBJECT: MAC CONTINUOUS AUDIT REPORT 2017 1st QUARTER DATE: July 17, 2017
More informationMaterial available on web at
Material available on web at http://gtumcain.wordpress.com Major topics Modules of ERP Human Resources Management Financial Management Inventory Management Quality Management Sales and Distribution (Murlidhar
More informationSubrecipient Invoice Checklist
Subrecipient Invoice Checklist Subrecipient: Purchase Order Number: High-Risk: Yes No Subrecipient Invoice Number: Cost Reimbursable Invoice: Low-Risk Criteria: Confirm invoice submission is in accordance
More informationCharges to sponsored projects are classified as either non-salary or salary.
EXPENDITURE APPROVAL AND CONTROL INITIATING CHARGES TO SPONSORED PROJECTS Charges to sponsored projects are classified as either non-salary or salary. Non-salary charges are initiated via: 1. Pcard; 2.
More informationUsing Data Analytics in Audits
Using Data Analytics in Audits Data Analytics is the process of inspecting, cleansing, transforming and modelling raw data with the purpose of discovering useful information, drawing conclusions and supporting
More informationKuali and edata Glossary of Terms
Kuali and edata Glossary of s Overview: This glossary is a compilation of the business and technical terminology relevant to the Kuali and edata. Purpose: The purpose of this glossary is to foster common
More information5/14/2018. Billing and Revenue Integrity How Do We Effectively Audit or Monitor? Today s Agenda. What We Hear as the Revenue Integrity Program Goal
Billing and How Do We Effectively Audit or Monitor? Lori Laubach, CHC Partner Health Care Consulting Today s Agenda Definition of revenue integrity How is the Government looking at revenue integrity? Revenue
More informationCash Reconciliations and Cash Handling
Cash Reconciliations and Cash Handling WASBO Accounting Conference March, 2016 Handling Cash Cash may be the most vulnerable asset in your LEA. How do you safeguard your cash? Timely reconciliation of
More informationPayables Management. 2 nd Edition. Steven M. Bragg
Payables Management 2 nd Edition Steven M. Bragg Chapter 1 Overview of Payables... 1 Learning Objectives... 1 Introduction... 1 Transaction Cycles... 1 Organizational Structure of the Accounting Department...
More informationCORP Appendix A CORPORATE POLICY. Attachments: Related Documents/Legislation: Revenue Administrative Policy
CORP2014-085 Appendix A CORPORATE POLICY Policy Title: Cash Handling Policy Policy Category: Financial Control Policy Policy No.: FC-016 Department: Corporate Services Approval Date: Revision Date: Author:
More informationCash Disbursement Procedure
ACCOUNTING PROCEDURES Georgia Recreation and Park Association March 2015 Cash Disbursement Procedure The following Cash Disbursement Procedure is the responsibility of the GRPA Office Manager under the
More informationFederal Education Programs Financial Management Practices
Federal Education Programs Financial Management Practices Legal Structures for Federal Programs Statutes / Legislation Program Statues (NCLB, IDEA, Perkins) General Education Provisions Act (GEPA) Regulations
More informationDiocese of Covington Policies & Procedures Manual Section: Compliance Accounting Policy: Internal Control & Segregation of Duties
Internal Control refers to the policies and procedures established to provide reasonable assurance that parish assets are safeguarded, that accountability is achieved, and that errors in financial records
More informationAdvanced Finance for Governing Board Members. Charter Schools: Advancing the Promise!! 2015 Annual Conference
Advanced Finance for Governing Board Members Charter Schools: Advancing the Promise!! 2015 Annual Conference Governing Body Responsibilities with regard to finance Fiduciary responsibilities outlined in
More informationFinancial Controls Checklist
Financial Controls Checklist Board of Health: Board of Health for the Leeds, Grenville & Lanark District Health Unit Period ended: Dec. 31/17 Objective: The objective of the Financial Controls Checklist
More informationFINANCE FUNCTION PROCESSES AND PERFORMANCE MEASURES
FINANCE FUNCTION PROCESSES AND PERFORMANCE MEASURES NOTE: The following material is intended to provide a brief overview of some finance function processes. This can be used as a high-level reference when
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL Page Analytic Name Employee names on the payroll that match a vendor PR Analytic 01 Ex-employees
More informationWhich of the following are subareas of the People Integration subcomponent of SAP NetWeaver?
SAP EDUCATION SAMPLE QUESTIONS: C_TERP10_60 SAP Certified Business Associate with SAP ERP 6.0 print view Disclaimer: These sample questions are for self-evaluation purposes only and do not appear on the
More informationEmissions Reductions Alberta
Emissions Reductions Alberta Project Audit Expectations October 21, 2016 Emissions Reduction Alberta (ERA) is a legal trade name of the Climate Change and Emissions Management (CCEMC) Corporation. What
More informationOverview of Sampling and Single Audit Reporting Requirements
Governmental Audit Quality Center Overview of Sampling and Single Audit Reporting Requirements A Governmental Audit Quality Center Web Event Today s speakers Rachel Flanders, CPA, CliftonLarsonAllen Erica
More informationAnalysis of Digital Financial Data
From the SelectedWorks of Robert L Kardell August, 2011 Analysis of Digital Financial Data Robert L Kardell Available at: https://works.bepress.com/robert_kardell/6/ Analysis of Digital Financial Data
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE Page Analytic Name Duplicate payments AP Analytic 01 Duplicate invoices AP Analytic 02 Duplicate
More informationSenior Administrative Retreat. Overview of Financial Services Division July 14, 2017 Presented by Liz Metzger
Senior Administrative Retreat Overview of Financial Services Division July 14, 2017 Presented by Liz Metzger What Do We Do? Prepares the consolidated annual audit report each year Primary liaison with
More informationGuide for the Preservation of Records For Public Water Utilities
Guide for the Preservation of Records For Public Water Utilities No. Types of Records Record Retention Corporate and General 1. Capital Stock Records:.. 2. Proxies and Voting Lists:... 3. Annual Report
More informationNorthern Oklahoma College Tonkawa, Oklahoma
Northern Oklahoma College Tonkawa, Oklahoma Internal Audit Report INTERNAL AUDIT REPORT Table of Contents Section Page Executive Summary of Procedures Performed and Results Thereof... I 1 Expenditures...
More informationConducting Internal Investigations
Conducting Internal Investigations Investigating Fraud Using Data Analytics 2018 Association of Certified Fraud Examiners, Inc. Data Analytics The use of analytics software to identify trends, patterns,
More informationUtilizing Technology in School Business Management
TITLE OF PRESENTATION Utilizing Technology in School Business Management LINE OF SUBTEXT & ADDITIONAL LINE September 2015 TITLE OF PRESENTATION Favorites TITLE OF PRESENTATION Favorite 1 TITLE OF PRESENTATIONSave
More informationSAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM
SAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM FINANCIAL PROCEDURES MANUAL Table of Contents GENERAL ACCOUNTING POLICY AND PROCEDURES... 3 OVERALL ACCOUNTING SYSTEM DESIGN... 3 CONTROL OBJECTIVE...
More informationFINANCIAL SERVICES DEPARTMENT Strategic Business Plan
FINANCIAL SERVICES DEPARTMENT Strategic Business Plan Mission The mission of the Financial Services Department is to provide compliant accounting, cash management, purchasing, and payment services to City
More informationU.S. Bank Access Online
U.S. Bank Access Online Overview U.S. Bank Access Online provides organizations with real time access to their commercial card programs anywhere, anytime, within a secured environment. This powerful proprietary
More informationDetecting & Preventing Procurement Fraud Using Data Analysis to Detect Improper Disbursements
Detecting & Preventing Procurement Fraud Using Data Analysis to Detect Improper Disbursements April 29, 2014 2:00 3:00pm ET Andrew Simpson, MBA Chief Operating Officer, CaseWare Analytics Paul Soos, CFE,
More informationManaging Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970)
Managing Fraud Risks in Procurement & Contacting The IIA Los Angeles Chapter October 2, 2017 John J. Hall, CPA (970) 926-0355 John@JohnHallSpeaker.com 1 Four Categories 1. Theft 2. Results Manipulation
More informationInternal Control Questionnaire
Internal Control Questionnaire CASH RECEIPTS/SALE QUESTIONS: 1. Is there a designated cash receipt custodian? 2. Are all receipts recorded on pre-numbered cash receipts tickets, including those received
More informationFRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies
Proactive Fraud Auditing End of Chapter 4 in Albrecht FRAUD DETECTION Recognizing the Symptoms of Fraud Actg 537 Identify Risk Exposures 1 2 Identify Fraud Symptoms for Each Exposure Proactively Look for
More informationAudit Department Report for June 2014
Report Report Office of the General Auditor Audit Department Report for June 2014 Summary Three reports were issued during the month: Gas Card Program Audit Report and Management Response ABSG Consulting,
More information3.09. Ontario Power Generation Acquisition of Goods and Services. Chapter 3 Section. Background
Chapter 3 Section 3.09 Ontario Power Generation Acquisition of Goods and Services Chapter 3 VFM Section 3.09 Background As part of the reorganization of Ontario Hydro, Ontario Power Generation (OPG) was
More informationThe Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions
Technology for Business Assurance The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application
More informationFederal Acquisition Service
U.S. General Services Administration Federal Acquisition Service GSA SmartPay Fleet Management Essentials Varuna Singh Center of Charge Card Management General Services Administration 2017 Fed Fleet Forum
More informationElavon Financial Services Visa Acquisition Card
GOVERNMENT SERVICES Elavon Financial Services Visa Acquisition Card Overview As a leading payments provider, Elavon Financial Services is committed to collaborating with its federal government partners
More informationUse of Forensic Data Analytics in Investigations. Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN
Use of Forensic Data Analytics in Investigations Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN gerry.zack@corporatecompliance.org Today s Agenda 1. A framework for using analytics in compliance
More information3/28/2016. Compliance and Operational Risk Management using Data Analytics. Agenda. ACL History. ACL Today. ACL is growing. What is data-driven GRC?
Agenda Compliance and Operational Risk Management using Data Analytics Presenters: Scott Robinson Account Executive, ACL Public Sector Mark Swann Metropolitan Auditor, Metropolitan Government of Nashville
More informationSIGAR JULY. Special Inspector General for Afghanistan Reconstruction
SIGAR Special Inspector General for Afghanistan Reconstruction SIGAR Financial Audit 13-11 Department of State s Afghanistan Media Project: Audit of Incurred Costs by HUDA Development Organization Afghanistan
More information