Oversight using Data Analytics
|
|
- Jean Allen
- 6 years ago
- Views:
Transcription
1 Oversight using Data Analytics MACPA Government and Not-for-Profit Conference April 17, 2015 Overview Data Analytics in Government Applications in Grant Oversight Applications in Purchase Card Oversight 1
2 DATA Act Greater Attention to Analytics in Government Promotes data sharing across government agencies Treasury data analytics center for OIGs automated oversight Government-wide structured data standards for financial reporting USASpending data should be standardized and machine-readable OIGs will audit data quality Improper Payments Elimination and Recovery Act (IPERA) Amends the Improper Payments Information Act of 2002 IPERIA strengthens estimations Strengthens detection, prevention, and recovery efforts Pre-award and pre-payment checks with Do Not Pay Annual risk assessments of covered programs Published improper payment estimates with reduction targets 3 Goal to reduce improper payments by $50B and recover $2B in 2 yrs Definition of Forensic Audit Forensic Audit 4 Audit that looks for financial misconduct, abusive or wasteful activity. Close coordination with investigators More than Computer Assisted Audit Techniques (CAATs) Forensic audit is growing in the Federal government GAO s Forensic Audit and Special Investigations (FSI) Recovery Board s Recovery Operations Center (ROC) Federal outlays are $3 trillion annually OMB estimates Federal improper payments at $110B GAGAS requires tests for fraud in audit work 100% review vs statistical sampling there is a place for both Automated Oversight Continuous monitoring Quick response 2
3 Automated Oversight More efficient use of resources 100% transaction review Still use traditional audit techniques to test transactions Improved risk identification Business rules based on risks Focus review on higher risks Recipients can use similar data analytics techniques Monitor grant spending Identify anomalies early Forensic Audit Approach Audit objectives and audit universe Work with investigations Structured brainstorming with subject matter experts Consider an SME or strategic planning conference Identify indicators of potential fraud and ways to find in data Process to identify financial risks capture all ideas Map out the end-to-end process Identify systems and key processes Identify key controls Identify and obtain transaction-level data Record layout 1000 record dump Modern analytics software can read virtually any data format Flat files, Delimited files, Dbase files, access databases, Report files,. No file size limits Build targeted business rules and run against data Examine anomalies 3
4 Different Levels of Knowledge Data Facts, numbers Information Summary Reports Dashboards and financial reports Knowledge Descriptive Analytics Statistics and automated business rules Wisdom Predictive Analytics Neural networks Decision trees Kohonen Networks Classification NSF OIG does not endorse commercial products Data Analytics Tools Data interrogation with automated business rules Data mining and predictive analytics Statistical analysis Link analysis Data conversion utilities Internet, open-source research Access to system query tools (e.g., SQL) 4
5 Framework for Data Analytics Using Government and Publicly Available Data Award level Data Grants, Contracts Transaction level Data Payee, Payment Amount, Date Award Systems Payment Systems Disbursing Systems Federal Reserve System Commercial Bank Data Download Data Analytics Oversight Review by Auditors Investigators Agencies Data Download Data Download Data Download Data Download Data Download Data Download Data Download Data Download Data Download GuideStar (non profits) SAM (includes EPLS) Federal Audit Clearinghouse Master Death File (SSA) Do Not Pay (Treasury) CPARS, FPDS Examples of systems that can help validate payment transactions Data Analytics Help with Oversight Determine reliability data fields Shape of the data (statistics) Completeness of transactions and fields Show anomalies. within a database between databases and changes in behavior over time Develop risk profiles for comparisons Awardee profiles Award-type profiles Program profiles 5
6 Common Data Analytics Tests Join Summarization Computed fields Corrupt data Blank fields (noteworthy if field is mandatory) Invalid dates Bounds testing Completeness Invalid codes Unreliable computed fields Illogical field relationships Trend analysis Duplicates Comparing Data Files (Three Bucket Theory) Vendors Not Paid Yet Vendors Paid and In Vendor Table Vendors Paid but not In Vendor Table Vendor Table (Valid vendors) Linking field allows for comparison Disbursing Transactions 6
7 Normal Distribution Anomalous Activity Normal Activity Anomalous Activity What is Data Mining? Refers to the use of machine learning and statistical analysis for the purpose of finding patterns in data sets. If you know exactly what you are looking for, use a structured query If you know only vaguely what you are looking for, turn to data mining. Most often used (up until recently) in marketing and customer analysis 7
8 Methods of Data Mining Supervised Modeling Predict patterns in data based on patterns of known information Decision Trees Neural Networks Unsupervised Modeling Identify anomalies or outliers based on grouping like transactions Kohonen Networks K-Means Clusters X 1 X 2 X 3 X 4 y 1 y 2 Building a Forensic Capability Develop Organizational Capability All audit staff should have basic skill with data analysis tools Forensic audit units perform more sophisticated analyses Targeted audits are more efficient in time and cost Phased Development Hardware and software Access to internal and external data Staff: system savvy, analytical, business process knowledge Training, then immediate application to work Very important component is tone at the top 8
9 U.S. Financial Assistance Overview $550 billion in awards 88,000 awardees and 26 Federal grant making agencies Project and research, block, and formula Outcomes are designed to promote public good Challenges Limited visibility of how Federal funds are spent by awardees Support for funding requests much less than for contracts American Recovery and Reinvestment Act (2009) $840 billion of assistance to stimulate the economy Greater accountability and transparency over spending than ever Opportunities to enhance oversight with less Automated oversight Framework for Grant Oversight Data analytics-driven, risk-based methodology to improve oversight Identify institutions that may not use Federal funds properly Techniques to surface questionable expenditures Life cycle approach to oversight Mapping of end-to-end process to identify controls 100% review of key financial and program information Focus attention to award and expenditure anomalies Complements traditional oversight approaches Techniques to review process and transactions are similar Transactions of questionable activities are targeted Recipients and Agency Officials can use data analytics Identify high risk activities through continuous monitoring 9
10 Grants Differ From Contracts GRANTS Promote services for the Public Good Merit review (competitive) Multiple awardees Award budget No government ownership Grant payments Summary drawdowns No invoices for claims Expenditures not easily visible Salary percentages CONTRACTS Specified deliverables (Goods and Services) Competitive process One awardee Contract Price Government ownership Contract payments Itemized payment requests Invoices to support claims Detailed costs Salary hourly rates End to End Process for Grant Oversight 6 PRE-AWARD RISKS Funding Over Time Conflict of Interest False Statements False Certifications Duplicate Funding Inflated Budgets Candidate Suspended/Debarred ACTIVE AWARD RISKS Unallowable, Unallocable, Unreasonable Costs Inadequate Documentation General Ledger Differs from Draw Amount Burn Rate No /Late/Inadequate Reports Sub-awards, Consultants, Contracts Duplicate Payments Excess Cash on Hand/Cost transfers Unreported Program Income AWARD END RISKS No /Late Final Reports Cost Transfers Spend-out Financial Adjustments Unmet Cost Share 10
11 Common Audit Findings 21 Data Analytics Audits Unallowable, unallocable, unreasonable costs Excess salary 2-month rule Indirect Costs Equipment Pre-Data Analytics Audits Unsupported costs Effort reporting Effort reporting (subaward) Pre-award charges Burn Rate Actual vs Expected Actual Expected Award Amount ($K) Expended ($K) %Expend Award Days Days Active % Total Days Delta 1 10,000 9,000 90% % ,000 4,000 80% % ,000 1,500 75% % , % % ,000 12,000 60% % ,000 5,000 50% % 0.57 Awarde e Totals 48,000 32,495 68% 7,302 3,997 55% would be normal 11
12 Risk Identification General risks Certain contract and grant awards tend to be riskier than others Smaller institutions tend to have weaker internal controls Specific risks 23 Something that happens in a process that stands out from normal activity Large drawdown on a single date end of a fiscal year Spending out remaining grant and contract funds at end of the award Challenges General risks can be more obvious Specific risks can be harder to see. Benefits greatly from transaction level data. Focus on Risk Many to the Few 600,000 Grant award drawdowns annually totaling $6.3 billion Each assigned a risk score 40,000 Active awards Each assigned a risk score 2,000 Institutions Each assigned a risk score 20 Audits of higher risk institutions Each audit tests all transactions for all awards with automated risk indicators 12
13 Risk Assessment and Identification of Questionable Transactions Phase I Identify High Risk Institutions Phase II Identify Questionable Expenditures Agency Award Data Award proposals Quarterly expense reports Cash draw downs Agency Award Data Award proposals Quarterly expense reports Cash draw downs Awardee Transaction Data General ledger Subsidiary ledgers Subaward data Data Analytics Continuous monitoring of grant awards and recipients Data Analytics Apply risk indicators to GL data and compare to Agency data Review Questionable Transactions External Data A-133 audits (FAC) SAM (CCR, EPLS) External Data A-133 audits (FAC) SAM (CCR, EPLS) Identification of Higher Risk Institutions and Transactions 13
14 Anomalous Drawdown Patterns $$ Start up costs Drawdown Spike Extinguishing Remaining Grant funds (before expiration) Extinguishing Remaining Grant funds (after expiration) Normal drawdown pattern Grant Award Grant Expiration 27 Early Drawdown 14
15 Spend out Pattern Draw Spike 15
16 A Common Drawdown Pattern Payroll Charges Incurred Subsequent to Grant Expiration 32 NSF OIG does not endorse any commercial software 16
17 Transfer of Payroll Charges 6 Months After the Grant Expired Equipment Charges Incurred Immediately Before Grant Expiration Same day as expiration 57 days before expiration 46 days before expiration 17
18 Cost Transfers after Grant Expiration 35 Travel Related to Award? Just before award expiration Just after award expiration 18
19 Purchase Card Oversight using Data Analytics 37 Government purchase card overview Simplified acquisition Still high risk for abuse without strong oversight Government Credit Card Fraud Prevention Act 2013 DoD Joint Purchase Card Review Current work at NSF Review objective DoD Joint Purchase Card Review 38 Identify purchase card abuses and recommend process improvement Universe under review 15 million purchase card transactions ($9 billion) 200,000 cardholders (CH) and 40,000 authorizing officials (AO) 300 DoDIG and Defense agency auditors/investigators Subject Matter Expert conferences Structured brainstorming with auditors, investigators, GSA officials Developed 115 indicators of potential fraud 46 codable Build targeted business rules and run against data Field research, reporting, and process improvements $122M in recoveries, 100 prosecutions, 275 adverse actions Most important outcome: indicators built into bank systems 19
20 Top Indicator Combinations 97% Adult websites, Weekend/Holidays 67% Purchases from 1 vendor, CH=AO 57% Adult websites 57% Internet transactions, 3rd party billing 53% Interesting vendors, many transactions 43% Even dollars, near limit, same vendor, vendor business w/few CHs 20
21 Current NSF Purchase Card Work Similar approach as DoD Joint Purchase Card Review Universe 3 years of purchase card activity 230 card holders 34,000 transactions $17 million Purchase card transaction data from the bank s website Worked closely with Investigations Developed risk indicators at transaction level Risk-based approach to testing 41 Risk Factor Examples 42 AO Span Of Control >4 Flags transactions for Carholders (CH) whose Approving official has a span of control of 5 or more CHs. (Risk value = 1) Suspect MCC Codes Flags transactions with MCC codes we deemed suspect (Risk value = 2) Blocked MCC Codes Flags transactions with Blocked MCC codes. (Risk value = 3) Holiday Purchases Flags transactions that occurred on holidays (Risk value = 3) Weekend Purchases Flags transactions that occurred on the weekends (i.e., Saturday or Sunday) (Risk value = 3) 21
22 Risk Factor Examples (continued) 43 Suspect Level 3 Data Flags transactions with Level 3 data we deemed suspect based on manual review (Risk value = 3). For example, possible personal purchase, possible split transaction, questionable legitimate business need. One to One Card Holder to Merchant Flags transactions in which the merchant only did business with that particular NSF card holder (Risk value = 2). Possible Split Purchase Flags transactions by a card holder in which more than 1 purchase to the same merchant totaling more than $3,000 occurred on the same day, or within a few days (Risk value = 3). Example of Level 3 Data 22
23 Questions? Dr. Brett M. Baker Assistant Inspector General for Audit National Science Foundation Office of Inspector General Phone:
Predictive Analysis Risk Analysis
Predictive Analysis Risk Analysis MARYLAND ASSOCIATION OF CPAS GOVERNMENT AND NOT-FOR-PROFIT CONFERENCE April 25, 2014 Overview Forensic Audit and Automated Oversight Data Analytics for Grant Oversight
More informationIIA Springfield IL Chapter
Adding Value with Data Analytics IIA Springfield IL Chapter October 14, 2010 0 Jan Beckmann, CPA, ACL Certified Trainer, ACDA jbeckmann@bswllc.com 314.983.1254 1050 N. Lindbergh Blvd. St. Louis, Missouri
More informationUsing Data Analytics as a Management Tool to Identify Organizational Risks
2013 CliftonLarsonAllen LLP Using Data Analytics as a Management Tool to Identify Organizational Risks Government Finance Officers Association of South Carolina October 13, 2014 cliftonlarsonallen.com
More informationAPPENDIX 2 COMMUNITY DEVELOPMENT COMMISSION FINANCIAL CHECKLIST REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER)
REQUIRED FOR ALL APPLICANTS (A SITE VISIT MAY BE CONDUCTED LATER) AGENCY NAME: AGENCY ADDRESS AGENCY PHONE: DATE PREPARED: PREPARED BY: TITLE: EMAIL: AGENCY GENERAL INFORMATION EXECUTIVE DIRECTOR /CITY
More informationUsing Transactional Analysis for
Using Transactional Analysis for Effective Fraud Detection Date: 15 th January 2009 Nishith Seth Seth Services.P. Ltd. www.sspl.net.in Cost Indirect costs: image, morale Fraud Issues & Impact Direct costs:
More informationContract and Procurement Fraud. Fraud in Procurement without Competition
Contract and Procurement Fraud Fraud in Procurement without Competition Sole-Source Awards Noncompetitive procurement process through the solicitation of only one source Procurement through sole-source
More informationSeattle Public Schools The Office of Internal Audit
Seattle Public Schools The Office of Internal Audit Internal Audit Report September 1, 2014 through Current Issue Date: June 21, 2016 Executive Summary Background Information The function is centralized
More informationCiti Support: Techniques for Establishing a Successful Audit Process
GSA SmartPay 2010 Conference Citi Support: Techniques for Establishing a Successful Audit Process David Ruda, Director North America Market Manager 12 th Annual GSA SmartPay Conference Atlanta, GA August
More informationFRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS
FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement
More informationFederal Acquisition Service
U.S. General Services Administration Federal Acquisition Service GSA SmartPay Fleet Management Essentials Varuna Singh Center of Charge Card Management General Services Administration 2017 Fed Fleet Forum
More informationLeveraging Data Analytics to Expand Audit Coverage and Add Organizational Value
Leveraging Data Analytics to Expand Audit Coverage and Add Organizational Value Clint McPherson Managing Director, Dallas, TX Cindy Hart Manager, Dallas, TX Setting the Stage - Data Analysis Defined Data
More informationYou can easily view comparative data and drill through for transaction details.
analyzing financial and operational information (such as number of sales reps, occupancy rates or cycle time), giving you a very powerful business management tool that leverages your financial data. You
More informationCan You Spot Fraudsters?
Can You Spot Fraudsters? CACUBO Workshop March 22, 2018 Eric Conforti, CPA, CFE 1 Who Are We? A One-Firm Firm: Over 2,200 industry experts to partner with when specific industry knowledge is needed during
More informationUniversity of South Florida. Evaluation of Financial Management Systems and Financial Capability Questionnaire
University of South Florida Evaluation of Financial Management Systems and Financial Capability Questionnaire Subrecipient: Subaward #: DUNS # Organization Type: EIN/TIN# The purpose of this questionnaire
More informationMIS 5208 Week 2 Fraud Detection & Prevention
MIS 5208 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@temple.edu Fraud Awareness & Internal Controls Awareness Internal
More informationThe Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions
Technology for Business Assurance The Best of Crimes, the Worst of Crimes: Fraud Stories That Prove the Truth Is in the Transactions Copyright 2009 ACL Services Ltd. Peter Millar Director, Technology Application
More informationLeading Practices to Leverage Forensic Data Analytics in Compliance Monitoring and Investigation
Leading Practices to Leverage Forensic Data Analytics in Compliance Monitoring and Investigation Table of contents 1 Proactive Compliance Monitoring 2 EY s First Annual Global Forensic Data Analytics Survey
More informationDetecting Fraud Through Vendor Audits
Detecting Fraud Through Vendor Audits Identifying and Selecting Audit Candidates 2017 Association of Certified Fraud Examiners, Inc. The Importance of Routinely Exercising Vendor Audit Rights There is
More informationFederal Education Programs Financial Management Practices
Federal Education Programs Financial Management Practices Legal Structures for Federal Programs Statutes / Legislation Program Statues (NCLB, IDEA, Perkins) General Education Provisions Act (GEPA) Regulations
More informationAudit and Timekeeping Requirements
Audit and Timekeeping Requirements Department of Health & Human Services National Institutes of Health / OD / OALM / OAMP Division of Financial Advisory Services Hruta Virkar, Director Dan Milstead, Branch
More informationTopics. Current Environment and Relevant Risks. Speakers. Contract and Compliance Monitoring Building a Successful Program
Speakers Contract and Compliance Monitoring Building a Successful Program January 21, 2016 Alyssa G. Martin, CPA Executive Partner, Advisory Services 25+ years of public accounting experience, with a practice
More informationElavon Financial Services Visa Acquisition Card
GOVERNMENT SERVICES Elavon Financial Services Visa Acquisition Card Overview As a leading payments provider, Elavon Financial Services is committed to collaborating with its federal government partners
More informationCharges to sponsored projects are classified as either non-salary or salary.
EXPENDITURE APPROVAL AND CONTROL INITIATING CHARGES TO SPONSORED PROJECTS Charges to sponsored projects are classified as either non-salary or salary. Non-salary charges are initiated via: 1. Pcard; 2.
More informationUncompensated Overtime. Next Slide
Uncompensated Overtime Table of Contents Risk Assessment Research and Planning Risk Assessment Labor System Entrance Conference Preliminary Analytical Procedures Audit Team Brainstorming for Fraud Risk
More informationUsing Data Analytics to Detect, Deter and Prevent Sponsored Research Fraud Paul Coleman (GT Affiliate)
Using Data Analytics to Detect, Deter and Prevent Sponsored Research Fraud Paul Coleman (GT Affiliate) Grants.GOV 2015 1074 Programs for Public Higher Ed -13 R&D Agencies HHS-CDC Health/Education/Daycare
More informationCouncil on Financial Assistance Reform s Uniform Guidance Training
Council on Financial Assistance Reform s Uniform Guidance Training UNIFORM ADMINISTRATIVE REQUIREMENTS, AUDIT REQUIREMENTS, AND COST PRINCIPLES 2 CFR CHAPTER 1, CHAPTER 2, PART 200, ET AL. January 27,
More informationFiscal Oversight Fundamentals
Fiscal Oversight Fundamentals Module 1: School District Finances: Roles and Responsibilities 2012 New York State School Boards Association, Latham NY The Five-Point Plan 1. Requires training for school
More informationUsing Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
More informationDepartment of Human Resources Local Department Operations
Audit Report Department of Human Resources Local Department Operations March 2002 This report and any related follow-up correspondence are available to the public. Alternate formats may also be requested
More informationCORP Appendix A CORPORATE POLICY. Attachments: Related Documents/Legislation: Revenue Administrative Policy
CORP2014-085 Appendix A CORPORATE POLICY Policy Title: Cash Handling Policy Policy Category: Financial Control Policy Policy No.: FC-016 Department: Corporate Services Approval Date: Revision Date: Author:
More informationDiocese of Covington Policies & Procedures Manual Section: Compliance Accounting Policy: Internal Control & Segregation of Duties
Internal Control refers to the policies and procedures established to provide reasonable assurance that parish assets are safeguarded, that accountability is achieved, and that errors in financial records
More informationUniversity Internal Audit
University Internal Audit Compliance Audit Overview Bill Abplanalp Audit Manager Agenda Introductions What is Internal Audit Compliance Review Questions Internal Audit Mission Provide independent, objective
More informationTop 10 Auditing Tips. for Travel Expense Reports Toni Waters, CPCP Corporate Credit Card & Expense Reporting Manager with FIS
Top 10 Auditing Tips San Antonio April 13-16, 2015 for Travel Expense Reports Toni Waters, CPCP Corporate Credit Card & Expense Reporting Manager with FIS 2015 NAPCP About FIS 2 FIS (NYSE: FIS) is the
More informationAUDIT STATUS. Continuous Auditing Ideas and Priority Ranking Draft: 8/7/2012
Compliance Identify single day stays and subsequent re-admissions Identify inappropriate unbundling of lab tests Identify frequent use of high risk organizations Match OIG-excluded providers list with
More informationManaging Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970)
Managing Fraud Risks in Procurement & Contacting The IIA Los Angeles Chapter October 2, 2017 John J. Hall, CPA (970) 926-0355 John@JohnHallSpeaker.com 1 Four Categories 1. Theft 2. Results Manipulation
More informationVOLUME 9 - Accounts Payable (Payment Management)
Defense Finance and Accounting Service DFAS 7900.4 M Financial Requirements Manual Volume 9, (Payment Management) April 2017 Strategy, Policy and Requirements SUBJECT: Description of Requirement Changes
More informationArizona s First University. Managing Accounts
Arizona s First University. Managing Accounts General Points Expenditure Approval Cost Transfers Topics Distribution of Income and Expense Error Certifications Backstops SPS Analytics: Dashboard Reports
More informationHARNESSING THE POWER OF DATA ANALYTICS AND CONTINUOUS MONITORING
HARNESSING THE POWER OF DATA ANALYTICS AND CONTINUOUS MONITORING SEPTEMBER 26, 2017 Shana McGee, CIA Manager, Risk Advisory Services Kirstie Tiernan, CFE, OCA Managing Director, Forensic Technology Services
More informationBusiness Requirements Definitions
Business Requirements s Department of Financial Services Date: 01/19/2017 Revision: Version 2.0 Table of Contents Overview... 3 Priority Field Values s... 4 Functional Requirements Categories... 5 Accounts
More informationUnderstanding the DCAA Audit Process and How to Prepare for Success
Understanding the DCAA Audit Process and How to Prepare for Success Breakout Session #: C11 Presented by: Beverly Arviso, CPA, Fellow, CPCM, CFCM Date: July 22, 2013 Time: 4:00-5:15 DCAA s Mission Compliance
More informationFRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies
Proactive Fraud Auditing End of Chapter 4 in Albrecht FRAUD DETECTION Recognizing the Symptoms of Fraud Actg 537 Identify Risk Exposures 1 2 Identify Fraud Symptoms for Each Exposure Proactively Look for
More informationMark. Data Mining. Smart Use of. is Good Business and Good Government. Copyright Association of Government Accountants.
Mark Smart Use of Data Mining is Good Business and Good Government 16 JOURNAL OF GOVERNMENT FINANCIAL MANAGEMENT Reused with permission. All rights reserved. SPRING 2012 By: Jeffrey C. Steinhoff, CGFM,
More informationReport No. D August 1, Internal Controls Over U.S. Army Corps of Engineers, Civil Works, Disbursement Processes
Report No. D-2011-094 August 1, 2011 Internal Controls Over U.S. Army Corps of Engineers, Civil Works, Disbursement Processes Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting
More informationFinancial Controls Checklist
Financial Controls Checklist Board of Health: Board of Health for the Leeds, Grenville & Lanark District Health Unit Period ended: Dec. 31/17 Objective: The objective of the Financial Controls Checklist
More informationGSA Federal Supply Service. Citibank Presents: Benchmarking the Success of Your Program
GSA Federal Supply Service Citibank Presents: Benchmarking the Success of Your Program Benchmarking the Success of Your Program Citibank Commercial Cards, Government Services Dave Ruda, Beth Shepherd,
More informationSEMINOLE COUNTY OFFICE OF MANAGEMENT AND BUDGET PURCHASING DIVISION BLANKET PURCHASE ORDER PROCESS AUDIT. March 31, 1998
SEMINOLE COUNTY OFFICE OF MANAGEMENT AND BUDGET PURCHASING DIVISION BLANKET PURCHASE ORDER PROCESS AUDIT March 31, 1998 March 31, 1998 The Honorable Randall C. Morris Chairman The Board of County Commissioners
More informationAre you prepared to meet the challenges of the DATA Act and open the door wider on government spending?
Are you prepared to meet the challenges of the DATA Act and open the door wider on government spending? Maryland Association of CPAs 2015 Government & Not for Profit Conference April 17, 2015 In the words
More informationAccounting and Auditing for Government Contractors
Accounting and Auditing for Government Contractors Presented By: C. P. Krishnan Newport Beach (CA) Dallas (TX) Washington (D.C) New Delhi (India) For more info - www.sba.gov Who is DCAA? The Defense Contract
More informationUsing Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Data Analysis Tests for Detecting Payroll and Expense Reimbursement Schemes 2018 Association of Certified Fraud Examiners, Inc. Payroll Schemes Fraudsters cause their
More informationGSA Federal Supply Service. Citigroup Presents: Benchmarking the Success of Your Program
GSA Federal Supply Service Citigroup Presents: Benchmarking the Success of Your Program Benchmarking the Success of Your Program Citibank Commercial Cards, Government Services Dave Ruda, Beth Shepherd,
More informationRepetitive Bidding of Duplicative Material Costs. Next Slide
Repetitive Bidding of Duplicative Material Costs Table of Contents Risk Assessment Research and Planning Risk Assessment Initial Review of Subcontract Proposal Preliminary Analytical Procedures Entrance
More informationEXTERNAL AUDITS. LPA Roundtable Event November Presented by: Gregory Stephens, Manager
EXTERNAL AUDITS LPA Roundtable Event November 2015 Presented by: Gregory Stephens, Manager Overview 1. Background Information 2. Different types of services and reviews provided o Reasons completed 3.
More informationInternal Audit Procurement Policies and Controls
Internal Audit Procurement Policies and Controls Melissa Aw Yong 10 October 2012 SAA Global Education Centre Pte Ltd Seminar 6/7 111 Somerset Road, #06-01/02 TripleOne Somerset Singapore 238164 Agenda
More informationSeveral unallowable expenditures and exceptions to policy were noted.
Several unallowable expenditures and exceptions to policy were noted. In our testing of 16 disbursement/pcard transactions, 12 travel transactions, and 9 gift transactions, we noted 6 transactions contained
More informationInternal Audit How the Internal Audit Function Facilitates Internal Controls. Office of the City Auditor City of Tallahassee
Internal Audit How the Internal Audit Function Facilitates Internal Controls Office of the City Auditor City of Tallahassee 1 Internal Audits and Internal Controls Session Purpose: How does an internal
More informationUnderstanding Internal Controls Office of Internal Audit
Understanding Internal Controls Office of Internal Audit July 2015 Objectives for this manual Provide guidance to help management understand their responsibility to ensure that internal controls are established,
More informationFire Department Inventory Management Audit
Fire Department Inventory Management Audit With over $3 million spent annually on inventory, the Fire Department needs stronger inventory management practices and controls Independence you can rely on
More informationU.S. General Services Administration. How Do I Manage My Centrally Billed Purchase Program Adam Jackson Account Manager Citi
U.S. General Services Administration How Do I Manage My Centrally Billed Purchase Program Adam Jackson Account Manager Citi July 2012 This material is intended for use by the GSA only 2012 GSA SmartPay
More informationCLAIMS AND DISBURSEMENTS
CLAIMS AND DISBURSEMENTS LEGAL COMPLIANCE MANUAL CLAIMS AND DISBURSEMENTS Introduction Municipal transactions involving an account, claim, or demand made for any property or service which can be itemized
More informationGarbage In - Garbage Out: Navigating through Bad Data to Perform Common Grant Accounting Tasks
Garbage In - Garbage Out: Navigating through Bad Data to Perform Common Grant Accounting Tasks Robert Cohen Senior Manager, Higher Education and Academic Medical Centers, Attain, LLC Martin Smith Manager,
More informationDue Diligence And Oversight of Vendors in the Current Regulatory Environment: What Nonprofits Need to Know November 28, 2017
Due Diligence And Oversight of Vendors in the Current Regulatory Environment: What Nonprofits Need to Know November 28, 2017 BDO USA, LLP, a Delaware limited liability partnership, is the U.S. member of
More informationComptroller of the Treasury Central Payroll Bureau
Audit Report Comptroller of the Treasury Central Payroll Bureau June 2006 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up
More informationCFC U.S. Bank One Card. Tuesday, July 12, 2011
CFC U.S. Bank One Card Tuesday, July 12, 2011 How to Submit Your Question Step 1: Type in your question here. Step 2: Click on the Send button. 2 Background Original card programs began in 2001 Consolidated
More informationInternal Control. Meeting Federal Requirements for Accountability. Robert Black, Senior Instructor 3 June 2016 PDI Orlando, FL
Internal Control Meeting Federal Requirements for Accountability Robert Black, Senior Instructor 3 June 2016 PDI Orlando, FL Internal Control Is EVERYONE S RESPONSIBILITY! Control Failure Examples Upper
More informationFRAUD IN GOVERNMENT AN OPEN DISCUSSION. Presented By William Blend, CPA, CFE
FRAUD IN GOVERNMENT AN OPEN DISCUSSION Presented By William Blend, CPA, CFE AGENDA Fraud and Ethics Discussion Fraud Triangle and Beyond Data from 2016 ACFE Report to the Nations Recent Fraud Investigations
More informationWHITE PAPER. The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud
WHITE PAPER The ACL Audit Analytic Capability Model: Leveraging analytics in the fight against fraud CONTENTS INTRODUCTION... 1 THE ANALYTIC CAPABILITY MODEL... 1 LEVEL 1 - BASIC... 3 Characteristics...
More informationFraud Prevention, Detection, and Internal Controls
Fraud Prevention, Detection, and Internal Controls Budget, Accounting and Reporting Council May 28, 2015 Sherrie Ard, CPA, CFE Financial Management Specialist Local Government Performance Center Local
More informationLA14-15 STATE OF NEVADA. Performance Audit. Department of Tourism and Cultural Affairs Division of Tourism. Legislative Auditor Carson City, Nevada
LA14-15 STATE OF NEVADA Performance Audit Department of Tourism and Cultural Affairs Division of Tourism 2014 Legislative Auditor Carson City, Nevada Audit Highlights Highlights of performance audit report
More informationInternal Audit Work Plan
Internal Audit Work Plan Fiscal Year 2018 Department of Management and Finance 1 Internal Audit Services Arlington County s Internal Audit Division is organizationally located in the Department of Management
More informationCITY OF CORPUS CHRISTI
CITY OF CORPUS CHRISTI CITY AUDITOR S OFFICE Audit of Purchasing Program Project No. AU12-004 September 20, 2012 City Auditor Celia Gaona, CIA CISA CFE Auditor Nora Lozano, CIA CISA Executive Summary In
More informationROSWELL PARK CANCER INSTITUTE CORPORATION INTERNAL CONTROLS OVER PROCUREMENT AND REVENUES. Report 2005-S-15 OFFICE OF THE NEW YORK STATE COMPTROLLER
Alan G. Hevesi COMPTROLLER OFFICE OF THE NEW YORK STATE COMPTROLLER DIVISION OF STATE SERVICES Audit Objective... 2 Audit Results - Summary... 2 Background... 3 Audit Findings and Recommendation... 3 Organizational
More informationApr 6 Thu 4:00 PM Deadline for submission of approved paper invoices and payment request forms to Payment Services.
Key Processing Deadlines Any changes to this schedule will be communicated via FS-bulletin. See the Detailed Year-end Schedule (page 4) for a complete list of year-end requirements. A condensed year-end
More informationJD Edwards EnterpriseOne Financial Management Overview
JD Edwards EnterpriseOne Financial Overview Karen L. Brown Senior Principal Product Manager Program Agenda 1 JD Edwards EnterpriseOne Overview 2 3 EnterpriseOne Financial Overview
More informationSubaward Online Invoice Review and Approval Process
Subaward Online Invoice Review and Approval Process Agenda Need for Improvement Federal Requirements Process Enhancements Invoice Submission Notification and Workflow SIR Invoice Review/Hold Reasons/Resolution
More informationContinuous Monitoring: Getting Results Today!
Continuous Monitoring: Getting Results Today! Gerard (Rod) Brennan, PhD, CFE Risk & Internal Control Officer NA, Siemens Corporation Jason A. Gross, CPA, CIA, CFE, CISA, ACDA Vice President, Controls Management,
More informationUniversity System of Maryland University of Baltimore
Audit Report University System of Maryland University of Baltimore January 2018 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information concerning
More informationMaterial available on web at
Material available on web at http://gtumcain.wordpress.com Major topics Modules of ERP Human Resources Management Financial Management Inventory Management Quality Management Sales and Distribution (Murlidhar
More informationMaster Document Audit Program. Version 1.7, dated April 2016 B-01 Planning Considerations
Activity Code 11070 Version 1.7, dated April 2016 B-01 Planning Considerations Accounting System Audit Audit Specific Independence Determination Members of the audit team and internal specialists consulting
More informationGUIDE FOR END-OF-YEAR AP BEST PRACTICES
GUIDE FOR END-OF-YEAR AP BEST PRACTICES TABLE OF CONTENTS 04 Year-End Checklist for Accounts Payable 05 Sample Year-End Calendar 07 Master Vendor File Cleanup & Maintenance 11 1099 Misc. Reporting & Corrections
More informationUniversity System of Maryland University of Maryland, College Park
Audit Report University System of Maryland University of Maryland, College Park May 2015 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY For further information
More informationUniversity System of Maryland Bowie State University
Audit Report University System of Maryland Bowie State University December 2004 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related follow-up
More information14-RFP-002-LJ (REISSUE) Comprehensive Performance Audit Services of SBD Incentive Agreements Technical Questions and Answers.
Responden t Question Number* 1 2 3 RFP Page Number, Section Number, Subsection Reference* Pg., 47, Section C: Scope of Work, C.4 Question* Is there an incumbent contractor or are the current services supported
More informationWELCOME TO SANTANDER TREASURY LINK
WELCOME TO SANTANDER TREASURY LINK You are on your way to experiencing a customizable and central hub from which to effectively manage your company s finances. To ensure you have a positive first experience
More informationPurchase Card On-Line System (PCOLS) WHITE PAPER
INTRODUCTION The purpose of this paper is to provide the reader with greater understanding and strategic perspective regarding the Purchase Card On-Line System (PCOLS) including the value it adds to more
More informationDetecting Fraud Through Data Analytics
Detecting Fraud Through Data Analytics Jeremy Clopton, CPA, CFE, ACDA Managing Consultant jclopton@bkd.com 417.865.8701 July 24, 2013 To Receive CPE Credit Participate in entire webinar Answer polls when
More informationINTERNAL CONTROL HANDBOOK
INTERNAL CONTROL HANDBOOK INTERNAL CONTROL HANDBOOK ILLINOIS STATE BOARD OF EDUCATION SCHOOL BUSINESS SERVICES DIVISION Revised July, 2017 Most Content remains the same as published in 1993 Prepared by
More informationContinuous Improvement with help of Data Analytics, the LeidenUniv business case
Rob van den Wijngaard Continuous Improvement with help of Data Analytics, the LeidenUniv business case Rob van den Wijngaard 26-10-2016 Bij ons leer je de wereld kennen Rob van den Wijngaard Implementation-
More informationOUTSMART FRAUD. Strategic Internal Controls to Prevent Business Fraud
OUTSMART FRAUD Strategic Internal Controls to Prevent Business Fraud GrowthForce LLC 800 Rockmead Drive Suite 200 Phone 281.358.2007 Fax 281.358.4120 OUTSMART BUSINESS FRAUD Using statistical data from
More informationFraud Risk Management
Fraud Risk Management Specific Anti-Fraud Controls (Process or Transaction Level) 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization have adequate staffing
More informationData analytics is a powerful tool to prevent fraud and manage risk
Data analytics is a powerful tool to prevent fraud and manage risk Identify risk of noncompliance with anti-corruption laws Prepared by: Victor Padilla, Director, RSM US LLP victor.padilla@rsmus.com, +1
More informationDepartment of Transportation Maryland Aviation Administration
Audit Report Department of Transportation Maryland Aviation Administration November 2012 OFFICE OF LEGISLATIVE AUDITS DEPARTMENT OF LEGISLATIVE SERVICES MARYLAND GENERAL ASSEMBLY This report and any related
More informationChristopher Newport University
Christopher Newport University Policy: Cell Phone Allowances Policy Policy Number: 3025 Executive Oversight: Executive Vice President Contact Office: Business Office Frequency of Review: Biennially Date
More informationWinning the Procure-to-Pay Battle
Winning the Procure-to-Pay Battle Procure Pay Rebecca Beck Director of Finance - DFAS Columbus DFAS Today Supports more people than any other financial agency Pays more vouchers, accounts, and appropriations
More information2/27/2017. Segregation of Duties/ Internal Controls. Objectives. Agenda
Segregation of Duties/ Internal Controls 2017 WASBO Accounting Conference David Maccoux, Shareholder Objectives Discuss failures of internal controls to detect or prevent fraud and learn how to implement
More informationFINANCIAL MANAGEMENT OF SERVICE CENTERS
FINANCIAL MANAGEMENT OF SERVICE CENTERS Category: Financial Date Established: 7/1999 Responsible Office: Financial Management Date Last Updated: 7/18/2017 Responsible Executive: Vice President for Finance
More informationSAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM
SAN FRANCISCO COURT APPOINTED SPECIAL ADVOCATE PROGRAM FINANCIAL PROCEDURES MANUAL Table of Contents GENERAL ACCOUNTING POLICY AND PROCEDURES... 3 OVERALL ACCOUNTING SYSTEM DESIGN... 3 CONTROL OBJECTIVE...
More information38 Years of Excellent Client Service New COSO Model and How Internal Controls Help to Reduce Opportunity for Fraud
38 Years of Excellent Client Service New COSO Model and How Internal Controls Help to Reduce Opportunity for Fraud Presented By William Blend, CPA, CFE Session Overview Review the new COSO model on internal
More informationChapter 7 Internal Controls
Chapter 7 Internal Controls Establishment of and adherence to internal controls is a major part of managing an organization. Internal controls serve as the first line of defense in safeguarding assets
More informationThe Hidden Costs of QuickBooks: Why Now is the Time to Graduate to a Modern Financial Management Software
The Hidden Costs of QuickBooks: Why Now is the Time to Graduate to a Modern Financial Management Software Table of Contents Summary... 3 Understanding the Costs of the Status Quo... 3 Identifying the Pain
More informationInternal Audit Report. Corporate Cards. July 26, 2001
July 26, 2001 To: D.L. Hughes D.L. Hardy C.J. Chan J. P. Ashurst H.D. Harris J.E. Gemmill P. Kundur K.G. Peterson Group Controllers G.N. Sherlock D.A. Harrison M. Costello (Summary) Finance Committee(Summary)
More information