Conducting investigations I Heart Audit Conference

Size: px
Start display at page:

Download "Conducting investigations I Heart Audit Conference"

Transcription

1 Conducting investigations I Heart Audit Conference February 2018

2 Agenda 2018 Global economic crime survey results Investigation lifecycle When to consider an independent investigation Please feel free to ask questions during the presentation. 2

3 Global economic crime survey 3

4 Survey results 4

5 Survey results 5

6 Assessment of business ethics and compliance programs 6

7 Factors contributing to economic crime committed by internal actors 7

8 Impact of economic crime 8

9 Most likely characteristics of internal fraudster 9

10 People measures implemented to address increased regulatory expectations 10

11 Investigation lifecycle 11

12 Identifying the issue Common detection methods include: Corporate Control - Internal Audit, fraud risk management, suspicious transaction monitoring Corporate Culture - Internal/external tip-off, whistle-blowing system Beyond Management Influence - Accidental discovery, law enforcement How was the crime initially detected? 14% 11% 11% 11% Suspicious transaction testing Internal Audit Tip-Off (internal) By Accident 12

13 Investigation lifecycle Reporting Follow-up Interviews of Knowledgeable Persons Scope & Background Analysis of Financial Transactions Evidence Collection 13

14 Scope & background Goals and objectives Documentation Legal considerations Work program 14

15 Evidence collection Identify, protect and preserve relevant documents Work with Legal to send a document preservation notice Consider collecting hard copy documents (office & cube sweeps), servers, Network drives, hard drives (e.g., laptops, smart phones, external drives), etc. Work with IT to stop back-up tape deletion rotation Capture complete data Search available backups/old and archived data Consider walking the facilities for old tapes Recover deleted s/files Run specialized software to crack password-protected files (or just ask for the passwords) 15

16 Evidence collection Factors to consider: Ownership, chain of custody (physical documents, electronic data) Documents received log (who, what, when, where) Original documents should be copied/scanned Never make notes on original documents Data security is first priority. Rigorous encryption and safety protocols must be exercised. The e-discovery process would involve: Identification Preservation Collection Processing Review Analysis Production 16

17 Evidence collection Thoroughly process & analyze data - Dedupe population methodically - Test search term syntax & apply terms methodically across custodians Limiting analysis to common file extensions and not requesting file signatures may inadvertently eliminate potential key documents Consider use of analytic options to more efficiently search data (e.g., BrainSpace) Train readers in investigation background and review tool Consider foreign language files: - May be difficult to process due to unusual character sets - May be ignored if readers are unfamiliar with the language in which the document is written Identify responsive, relevant, key documents Document procedures performed (there will likely be questions later) 17

18 Evidence collection Direct Real Circumstantial Internal Records Financial records Legal records HR Electronic media Interviews 18

19 Analysis of financial transactions Planning Identify data, files, and fields Design tests based on past experience, company policies, data and fields, transactions, etc. Acquisition Master files, transaction files, employee data PO fields, VAT fields, vendor listing Validation Reconcile data to source files Tie data to the financial statements Analysis Identify red flags, false positives, and procedural breaches Consider purchase patterns, sequential invoicing, retrospective POs, and master-file duplicates Results Trace paperwork, review files, conduct interviews Implement controls and monitor compliance 19

20 Interview of knowledgeable persons Purpose of the interview The purpose of interviewing is to gather information and evidence as well as differentiate/eliminate suspects and witnesses. Interview Objective is to gain information Open ended Notes should be taken The witness should do the talking Tone should be supportive Interrogation Objective is to gain a confession or admission Highly structured No notes The investigator should do the talking Tone should be accusatory 20

21 Interview of knowledgeable persons Interview process Decide who will take notes and through what method Notes will be less accurate than a recording, but should be words to that effect Place key quotes in quotation marks Prepare memorandum of notes soon after the interview is conducted Review relevant documents to identify materials that will assist in conducting the interview or for which an explanation is needed Know subject matter Understand the interviewee s background Prepare an outline, detailing the topics to be addressed and the documents to be used in connection with each topic Cover necessary topics to complete the interview If additional time is needed, advise the witness and attempt to gain his/her commitment of continued cooperation Express appreciation for the time and effort expended to complete the interview If appropriate, permit the witness to ask any questions express concerns he/she may have regarding the investigative process or the subject matter of the investigation Use a standard introduction for each interview you conduct providing the interviewee with: - Name - Company affiliation - Purpose of the interview - Any legal implications Build rapport with the interviewee Use a combination of direct, leading, and open-ended questions Paraphrase key responses to ensure mutual understanding Consider verbal and non-verbal cues Select a location that will facilitate the interview Don t conduct the interview alone select attendees in order to facilitate the interview 21

22 Interview of knowledgeable persons Preparing for the interview Decide who will take notes and through what method Notes will be less accurate than a recording, but should be words to that effect Place key quotes in quotation marks Prepare memorandum of notes soon after the interview is conducted Relevant documents Documents requiring further explanation Subject matter knowledge Interviewee s background Understand the allegations Outline questions Cover necessary topics to complete the interview If additional time is needed, advise the witness and attempt to gain his/her commitment of continued cooperation Express appreciation for the time and effort expended to complete the interview If appropriate, permit the witness to ask any questions express concerns he/she may have regarding the investigative process or the subject matter of the investigation Use a standard introduction for each interview you conduct providing the interviewee with: - Name - Company affiliation - Purpose of the interview - Any legal implications Build rapport with the interviewee Use a combination of direct, leading, and open-ended questions Paraphrase key responses to ensure mutual understanding Consider verbal and non-verbal cues Select a location that will facilitate the interview Don t conduct the interview alone select attendees in order to facilitate the interview 22

23 Interview of knowledgeable persons Interview setting Decide who will take notes and through what method Notes will be less accurate than a recording, but should be words to that effect Place key quotes in quotation marks Prepare memorandum of notes soon after the interview is conducted Review relevant documents to identify materials that will assist in conducting the interview or for which an explanation is needed Know subject matter Understand the interviewee s background Prepare an outline, detailing the topics to be addressed and the documents to be used in connection with each topic Cover necessary topics to complete the interview If additional time is needed, advise the witness and attempt to gain his/her commitment of continued cooperation Express appreciation for the time and effort expended to complete the interview If appropriate, permit the witness to ask any questions express concerns he/she may have regarding the investigative process or the subject matter of the investigation Use a standard introduction for each interview you conduct providing the interviewee with: - Name - Company affiliation - Purpose of the interview - Any legal implications Facilitating environment Multiple participants Build rapport with the interviewee Use a combination of direct, leading, and open-ended questions Paraphrase key responses to ensure mutual understanding Consider verbal and non-verbal cues 23

24 Interview of knowledgeable persons During the interview Decide who will take notes and through what method Notes will be less accurate than a recording, but should be words to that effect Place key quotes in quotation marks Prepare memorandum of notes soon after the interview is conducted Review relevant documents to identify materials that will assist in conducting the interview or for which an explanation is needed Know subject matter Understand the interviewee s background Prepare an outline, detailing the topics to be addressed and the documents to be used in connection with each topic Cover necessary topics to complete the interview If additional time is needed, advise the witness and attempt to gain his/her commitment of continued cooperation Express appreciation for the time and effort expended to complete the interview If appropriate, permit the witness to ask any questions express concerns he/she may have regarding the investigative process or the subject matter of the investigation Standard introduction Purpose of interview Build rapport with interviewee Use direct, leading, and openended questions Select a location that will facilitate the interview Don t conduct the interview alone select attendees in order to facilitate the interview Paraphrase key responses to confirm understanding Consider verbal/non-verbal cues 24

25 Interview of knowledgeable persons Concluding the interview Decide who will take notes and through what method Notes will be less accurate than a recording, but should be words to that effect Place key quotes in quotation marks Prepare memorandum of notes soon after the interview is conducted Review relevant documents to identify materials that will assist in conducting the interview or for which an explanation is needed Know subject matter Understand the interviewee s background Prepare an outline, detailing the topics to be addressed and the documents to be used in connection with each topic Cover necessary topics Gain cooperation for additional interview Express appreciation Permit witness to ask questions, if appropriate Use a standard introduction for each interview you conduct providing the interviewee with: - Name - Company affiliation - Purpose of the interview - Any legal implications Build rapport with the interviewee Use a combination of direct, leading, and open-ended questions Paraphrase key responses to ensure mutual understanding Consider verbal and non-verbal cues Select a location that will facilitate the interview Don t conduct the interview alone select attendees in order to facilitate the interview 25

26 Interview of knowledgeable persons Meeting notes Decide who will take notes Determine note methodology Key quotes in quotation marks Prepare memorandum soon after interview Review relevant documents to identify materials that will assist in conducting the interview or for which an explanation is needed Know subject matter Understand the interviewee s background Prepare an outline, detailing the topics to be addressed and the documents to be used in connection with each topic Cover necessary topics to complete the interview If additional time is needed, advise the witness and attempt to gain his/her commitment of continued cooperation Express appreciation for the time and effort expended to complete the interview If appropriate, permit the witness to ask any questions express concerns he/she may have regarding the investigative process or the subject matter of the investigation Use a standard introduction for each interview you conduct providing the interviewee with: - Name - Company affiliation - Purpose of the interview - Any legal implications Build rapport with the interviewee Use a combination of direct, leading, and open-ended questions Paraphrase key responses to ensure mutual understanding Consider verbal and non-verbal cues Select a location that will facilitate the interview Don t conduct the interview alone select attendees in order to facilitate the interview 26

27 Follow up Once the initial document review and interviews have been completed: Consider the evidence gathered Re-evaluate the scope Perform additional procedures as needed Consider remediation procedures if needed 27

28 Reporting Do Consider the stakeholders Summary of process and results Independent and objective language Spell and grammar check Write opinions Use qualitative words (all, large, etc.) Legal determinations where appropriate Don t 28

29 Common investigation pitfalls Not bringing questions to someone s attention Directly confronting the suspect Failure to secure data Electronic media process if flawed Failure to assess the ramifications Expectation that an investigation is quick Tendency to do a superficial investigation Concluding on suspect culpability based on conjecture Dismissing the allegations based on materiality/value Dismissing the allegations based on personal knowledge of the suspect Not communicating early and openly with external auditors Not anticipating stakeholder requirements 29

30 When to consider an independent investigation 30

31 Investigation life cycle Phase I Preliminary investigation Multiple Source Origination Consider coordinating with internal resources. Incident Claim Capture Evaluate? Yes No End Consider concluding investigation internally. No No Senior management implication No Preliminary Investigation Incident appears to be an isolated issue Document Protection Yes Do concerns relate to potential: a. Illegal acts, b. Restatement, or c. Misbehavior by senior mgmt. Yes Independent Investigation Conducted Yes Phase II 31

32 Investigation life cycle Phase II Independent investigation Independent Investigation Conducted Sizing and dating of problems Information Gathering Interviews Document Gathering E-media Communication Strategy: Audit Committee Auditors Regulators Investigation team Re-scoping and additional procedures Phase III 32

33 Investigation life cycle Phase III Reporting and remediation Remediation Recommendations Investigative Report (oral or written) Preservation of Investigation Documentation Respond to Inquiries Findings Follow-up with Management, Audit Committee, and/or Ind. Accountants 33

34 Common asset misappropriation schemes Asset Misappropriation involves theft, embezzlement or wrongful use of an organization s assets. Disbursement Related Receipt Related Corruption Related Other Check Fraud Skimming Bid rigging Bustout Billing & Fictitious Vendors Ghost Employees Check Kiting Lapping Kickbacks Ponzi or pyramid scheme Overpayment to Employees Expense Reimbursements 34

35 Common financial statement fraud schemes Revenue-Related Schemes Expenses- Related Schemes Balance Sheet Schemes Significant Management Estimates Other Financial Statement Schemes Channel Stuffing Conditional Sales (including consignment sales) Bill and Hold Cut-off Backdating Sham Sales Round-tipping Unauthorized shipment Reclassification of COGS to Operating Expenses Channel Incentives and Rebates Cookie Jar Reserves Capitalization of Expenses Gross Versus Net Recognition Concealed Liabilities Fraudulently stating valuation of assets and liabilities Inventory valuation schemes Fictitious assets Misappropriation of assets Biases can result in overly optimistic or overly conservative assumptions Failure to record or disclose known expenses Manipulation of fair value estimates Manipulation of period depreciation or amortization Improper disclosures Improper classification of account balances (e.g. current vs. non-current) Failure to properly disclose stock compensation and executive compensation 35

36 Examples of Make the entry in January so as not to highlight the issue to auditors I have instructed XXXX to have YYYY come in tomorrow and erase critical data off the servers and computers in use I have increased the percentage stated in the estimated cost report to get the earned revenue up to the value actually reported We can produce (dummy) documentation that will satisfy XXX s appetite and ostensibly be seen to be compliant Never thought I d ever admit this, but under your caption - Attorney- Client Privilege - I feel like I m in a confessional To close this year end, we had to do a lot of very desperate things, more than you can possibly imagine This shipment will be leaving the building with Elvis this afternoon. XXX (not the customer) will be holding this order for 30-days 36

37 Questions? 37

38 2018 PwC. All rights reserved. PwC refers to the US member firm or one of its subsidiaries or affiliates, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see for further details.

STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD

STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD 1 10.1 Fraud -- Nature, Prevention, and Detection..................................... 1 10.2 Fraud -- Indicators........................................................

More information

IAASB Main Agenda (March 2005) Page Agenda Item 12-C

IAASB Main Agenda (March 2005) Page Agenda Item 12-C IAASB Main Agenda (March 2005) Page 2005 429 Agenda Item 12-C [ISA AND IAPS SPLIT] PROPOSED INTERNATIONAL AUDITING PRACTICE STATEMENT XXX THE APPLICATION OF INTERNATIONAL STANDARDS ON AUDITING IN AN AUDIT

More information

Can You Spot Fraudsters?

Can You Spot Fraudsters? Can You Spot Fraudsters? CACUBO Workshop March 22, 2018 Eric Conforti, CPA, CFE 1 Who Are We? A One-Firm Firm: Over 2,200 industry experts to partner with when specific industry knowledge is needed during

More information

Using Data Analytics as a Management Tool to Identify Organizational Risks

Using Data Analytics as a Management Tool to Identify Organizational Risks 2013 CliftonLarsonAllen LLP Using Data Analytics as a Management Tool to Identify Organizational Risks Government Finance Officers Association of South Carolina October 13, 2014 cliftonlarsonallen.com

More information

Internal Controls Integrating COSO

Internal Controls Integrating COSO Community Action Partnership 2016 Annual Convention August 30 September 2, 2016 Austin, TX J.W. Marriott Austin Internal Controls Integrating COSO Thursday, September 1, 2016 9:15 am 10:45 am Presented

More information

Using Data Analytics to Detect Fraud

Using Data Analytics to Detect Fraud Using Data Analytics to Detect Fraud Data Analysis Tests for Detecting Payroll and Expense Reimbursement Schemes 2018 Association of Certified Fraud Examiners, Inc. Payroll Schemes Fraudsters cause their

More information

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS

FRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement

More information

Conducting Effective Internal Investigations. From Workplace Harassment to Criminal Conduct and Everything in Between

Conducting Effective Internal Investigations. From Workplace Harassment to Criminal Conduct and Everything in Between Conducting Effective Internal Investigations From Workplace Harassment to Criminal Conduct and Everything in Between Presenters Christopher G. Keim Partner, Management Committee Chris is a trial lawyer

More information

AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk

AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young ICPAU Page 1 COURSE CONTENT Lessons on Audit Risk Identification of audit risk and audit risk assessment

More information

Auditing Standards and Practices Council

Auditing Standards and Practices Council Auditing Standards and Practices Council PHILIPPINE STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT PHILIPPINE STANDARD ON AUDITING

More information

Common Frauds Found in Not-for- Profit Organizations

Common Frauds Found in Not-for- Profit Organizations Common Frauds Found in Not-for- Profit Organizations NCACPA Not-for-Profit Conference May 19, 2015 Presented by Lynda M. Dennis CPA, CGFO, PhD Today s Session Overview 2014 Occupational Fraud Report Findings

More information

INTERNATIONAL STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT CONTENTS

INTERNATIONAL STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT CONTENTS INTERNATIONAL STANDARD ON AUDITING 315 UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT (Effective for audits of financial statements for periods beginning

More information

(ATFL) Whistle-blowing Policy (Vigil Mechanism)

(ATFL) Whistle-blowing Policy (Vigil Mechanism) (ATFL) Whistle-blowing Policy (Vigil Mechanism) INDEX 1. OWNER... 3 2. BACKGROUND AND OBJECTIVES OF THE POLICY... 3 4. COVERAGE... 4 5. SCOPE... 4 6. EXCLUSIONS... 4 7. DEFINITIONS... 5 8. REPORTING CHANNEL...

More information

2013 PUBLIC ENTITIES OVERVIEW FOR KNOWLEDGE COACH USERS

2013 PUBLIC ENTITIES OVERVIEW FOR KNOWLEDGE COACH USERS 2013 PUBLIC ETITIES OVERVIEW FOR KOWLEDGE COACH USERS PURPOSE This document is published for the purpose of communicating, to users of the toolset, updates and enhancements included in the current version.

More information

Chapter 11 The Revenues, Receivables and Receipts Process

Chapter 11 The Revenues, Receivables and Receipts Process Chapter 11 The Revenues, Receivables and Receipts Process Understanding the Revenue, Receivables and Receipts Process The auditor must understand the business s method of generating revenues and use of

More information

Fraud Prevention, Detection, and Internal Controls

Fraud Prevention, Detection, and Internal Controls Fraud Prevention, Detection, and Internal Controls Budget, Accounting and Reporting Council May 28, 2015 Sherrie Ard, CPA, CFE Financial Management Specialist Local Government Performance Center Local

More information

OVERVIEW 4/19/10. Internal Controls and the Audit Process May 4, 2010 OVERVIEW. Definition and historical perspective of internal auditing

OVERVIEW 4/19/10. Internal Controls and the Audit Process May 4, 2010 OVERVIEW. Definition and historical perspective of internal auditing and the Audit Process May 4, 2010 Presented by: Deborah A. Stevens CPA Wichita County Auditor 1 OVERVIEW Definition and historical perspective of internal auditing Role and responsibilities of the internal

More information

2/20/15. Trevor Stewart, CPA Director of Business Services Source documentation includes CCIA and FCMAT

2/20/15. Trevor Stewart, CPA Director of Business Services Source documentation includes CCIA and FCMAT 2/20/15 Trevor Stewart, CPA Director of Business Services Source documentation includes CCIA and FCMAT The Fraud Triangle factors that influence the commission of fraud The Fraud Tree occupational fraud

More information

Fraud Prevention: How to Identify and Protect Your Higher Ed Institution

Fraud Prevention: How to Identify and Protect Your Higher Ed Institution Fraud Prevention: How to Identify and Protect Your Higher Ed Institution November 16, 2017 Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered investment

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA II. THE USE OF COMPUTERS IN OCCUPATIONAL FRAUD Occupational fraud refers to the

More information

OUTSMART FRAUD. Strategic Internal Controls to Prevent Business Fraud

OUTSMART FRAUD. Strategic Internal Controls to Prevent Business Fraud OUTSMART FRAUD Strategic Internal Controls to Prevent Business Fraud GrowthForce LLC 800 Rockmead Drive Suite 200 Phone 281.358.2007 Fax 281.358.4120 OUTSMART BUSINESS FRAUD Using statistical data from

More information

IAASB Main Agenda (December 2004) Page Agenda Item

IAASB Main Agenda (December 2004) Page Agenda Item IAASB Main Agenda (December 2004) Page 2004 2159 Agenda Item 7-B PROPOSED INTERNATIONAL STANDARD ON AUDITING XXX THE AUDIT OF GROUP FINANCIAL STATEMENTS CONTENTS Paragraph Introduction... 1-3 Definitions...

More information

McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill/Irwin. Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Copyright 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 04 Management Fraud and Audit Risk Learning Objectives 1. Define business risk and understand how management

More information

Data analytics is a powerful tool to prevent fraud and manage risk

Data analytics is a powerful tool to prevent fraud and manage risk Data analytics is a powerful tool to prevent fraud and manage risk Identify risk of noncompliance with anti-corruption laws Prepared by: Victor Padilla, Director, RSM US LLP victor.padilla@rsmus.com, +1

More information

Segregation of Duties

Segregation of Duties Segregation of Duties The Basics of Accounting Controls Segregation of Duties The Basics of Accounting Controls 2014 SP Plus Corporation. All rights reserved. No part of this publication may be reproduced,

More information

MIS 5208 Week 2 Fraud Detection & Prevention

MIS 5208 Week 2 Fraud Detection & Prevention MIS 5208 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@temple.edu Fraud Awareness & Internal Controls Awareness Internal

More information

Internal Control Evaluation

Internal Control Evaluation INTERNAL CONTROL EVALUATION Adapted from a checklist created by Jackie F. Breland, CPA (www.jackiebreland.com) Organization: Date Prepared or Updated: Prepared by: Introduction The purpose of this checklist

More information

Managing the Risk of Fraud in the Conversion to IFRS

Managing the Risk of Fraud in the Conversion to IFRS Managing the Risk of Fraud in the Conversion to IFRS Fernando Cancino, CFE, CIA BPO Executive Americas Amicorp A Road Frocked with Risk Conversion to IFRS Conversion Risk of Fraud Risk Mitigation Strategy

More information

Financial Statement Close Process

Financial Statement Close Process Financial Statement Close Process Process Control Objective Risk Control Considerations Segregation of Duties Accounting functions are properly segregated. Unauthorized and inaccurate transactions may

More information

S12 - Guidelines for Planning an IS Audit Christopher Chung

S12 - Guidelines for Planning an IS Audit Christopher Chung S12 - Guidelines for Planning an IS Audit Christopher Chung IS Auditing Guidelines for Planning an IS Audit Session Objectives Agenda Information Systems Audit Planning and Scoping o Understanding Business

More information

Financial Forensic Accounting

Financial Forensic Accounting Financial Forensic Accounting Qualification Forensic Accounting and Investigation Scope of Content Updated: 02 March 2018 6. SCOPE OF CONTENT 1. White-collar crime overview 1.1. What is fraud 1.2. What

More information

Pre-Engagement Activities and Audit Planning By: Tariq Mahmood FCA, ACMA

Pre-Engagement Activities and Audit Planning By: Tariq Mahmood FCA, ACMA Model Audit Practice Manual Pre-Engagement Activities and Audit Planning By: Tariq Mahmood FCA, ACMA Today s Learnings Pre-Engagement Activities Audit Planning Procedures Completion of Sample Forms (Annexures)

More information

(Effective for audits of financial statements for periods ending on or after December 15, 2013) CONTENTS

(Effective for audits of financial statements for periods ending on or after December 15, 2013) CONTENTS INTERNATIONAL STANDARD ON AUDITING 315 (REVISED) IDENTIFYING AND ASSESSING THE RISKS OF MATERIAL MISSTATEMENT THROUGH UNDERSTANDING THE ENTITY AND ITS ENVIRONMENT Introduction (Effective for audits of

More information

- Excessive gambling or investment habits - Strong challenge to beat the system - Undue family pressure such as divorce - Overwhelming desire for pers

- Excessive gambling or investment habits - Strong challenge to beat the system - Undue family pressure such as divorce - Overwhelming desire for pers RED FLAGS OF INTERNAL FRAUD PROFILE OF THE PERPETRATOR: - Most frequently it is the person you trust the most - Has the technical skills to pull off the theft secretly - The activity is clandestine - The

More information

Entity level controls Design/implementation 530 Page 1 of 9

Entity level controls Design/implementation 530 Page 1 of 9 Page 1 of 9 Entity Period ended Objective: To document the design and implementation of the following elements of internal control: Environment Assessment Financial Reporting (part of information systems)

More information

Employee Dishonesty: Prevention and Detection

Employee Dishonesty: Prevention and Detection Employee Dishonesty: Prevention and Detection Frontline Risk Management Series Welcome to this session on Employee Dishonesty, a risk management module presented by CUMIS General Insurance s Risk Solutions

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Specific Anti-Fraud Controls (Process or Transaction Level) 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization have adequate staffing

More information

Amounts posted to trade receivables were not related to valid sales.

Amounts posted to trade receivables were not related to valid sales. SECTION A CASE QUESTIONS (Total: 50 marks) Answer 1(a) The balance of trade receivables as at 30 June 2014 significantly increased when compared to that of 31 December 2013, which did not match with the

More information

Triple C Housing, Inc. Compliance Plan

Triple C Housing, Inc. Compliance Plan Triple C Housing, Inc. Compliance Plan Adopted by Board of Directors on draft November 13, 2014 Overview Triple C Housing, Inc. is committed to its consumers, employees, contractual providers, vendors,

More information

Week 3: Fraud, Procure to Pay Process Controls

Week 3: Fraud, Procure to Pay Process Controls Edward Beaver Edward.Beaver@temple.edu ff MIS 5121: Business Processes, ERP Systems & Controls Week 3: Fraud, Procure to Pay Process Controls Video: Record the Class Discussion v Something really new,

More information

Internal Control and the Computerised Information System (CIS) Environment. CA A. Rafeq, FCA

Internal Control and the Computerised Information System (CIS) Environment. CA A. Rafeq, FCA Internal Control and the Computerised Information System (CIS) Environment CA A. Rafeq, FCA 1 Agenda 1. Internal Controls and CIS Environment 2. Planning audit of CIS environment 3. Design and procedural

More information

Minimizing fraud exposure with effective ERP segregation of duties controls

Minimizing fraud exposure with effective ERP segregation of duties controls Minimizing fraud exposure with effective ERP segregation of duties controls Prepared by: Luke Leaon, Manager, RSM US LLP luke.leaon@rsmus.com, +1 612 629 9072 Adam Harpool, Manager, RSM US LLP adam.harpool@rsmus.com,

More information

Diving into the 2013 COSO Framework. Presented by: Ronald A. Conrad

Diving into the 2013 COSO Framework. Presented by: Ronald A. Conrad Diving into the 2013 COSO Framework Presented by: Ronald A. Conrad 2 Objectives Obtain an understanding of why the COSO Framework has been updated Understand how the framework has changed Identify the

More information

Sample Audit Committee. of Auditors and Management

Sample Audit Committee. of Auditors and Management Sample Audit Committee Questions to Ask of Auditors and Management 2 Sample Audit Committee Questions to Ask of Auditors and Management u Sample Audit Committee Questions to Ask of Auditors and Management

More information

Fraud and the Small Business Owner

Fraud and the Small Business Owner Fraud and the Small Business Owner Can you recognize it when you see it? National Society of Accountants Annual Meeting August 15, 2009 Erik H. Lindquist, CFE Presenter Definition The use of one s occupation

More information

Avoiding Missteps When Fraud is Suspected

Avoiding Missteps When Fraud is Suspected Avoiding Missteps When Fraud is Suspected By Duncan B. Will, CPA/ABV/CFF, CFE Fraud can have a devastating impact on CPAs clients and on CPAs as well if they aren t careful in defining the scope of their

More information

COSO Updates and Expectations. IIA San Diego Chapter January 8, 2014

COSO Updates and Expectations. IIA San Diego Chapter January 8, 2014 COSO Updates and Expectations IIA San Diego Chapter January 8, 2014 Agenda Overview of 2013 Internal Control-Integrated Framework and Companion Guidance 2013 Framework General Enhancements by Component

More information

EY Center for Board Matters. Leading practices for audit committees

EY Center for Board Matters. Leading practices for audit committees EY Center for Board Matters for audit committees As an audit committee member, your role is increasingly complex and demanding. Regulators, standard-setters and investors are pressing for more transparency

More information

CODE OF ETHICS/CONDUCT

CODE OF ETHICS/CONDUCT CODE OF ETHICS/CONDUCT This Code of Ethics/Conduct ( Code ) covers a wide range of business practices and procedures. It does not cover every possible issue that may arise, but rather provides information

More information

CODE OF BUSINESS CONDUCT PENN NATIONAL GAMING, INC.

CODE OF BUSINESS CONDUCT PENN NATIONAL GAMING, INC. CODE OF BUSINESS CONDUCT PENN NATIONAL GAMING, INC. (as amended March 27, 2015) INTRODUCTION The reputation and integrity of Penn National Gaming, Inc. and its subsidiaries (the Company ) are valuable

More information

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers,

This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, This document articulates ethical and behavioral guidance for all NGA Human Resources companies, employees, and business partners (such as suppliers, agents, vendors and sub-contractors). To help guide

More information

REGISTERED CANDIDATE AUDITOR (RCA) TECHNICAL COMPETENCE REQUIREMENTS

REGISTERED CANDIDATE AUDITOR (RCA) TECHNICAL COMPETENCE REQUIREMENTS REGISTERED CANDIDATE AUDITOR (RCA) TECHNICAL COMPETENCE REQUIREMENTS 1. Context After completion of the recognised training contract, a period of specialisation is required, appropriate to the level required

More information

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004

CODE OF BUSINESS CONDUCT AND ETHICS. FRONTIER AIRLINES, INC. Adopted May 27, 2004 1. Introduction CODE OF BUSINESS CONDUCT AND ETHICS FRONTIER AIRLINES, INC. Adopted May 27, 2004 The Board of Directors adopted this Code of Business Conduct ( Code ) to establish basic legal and ethical

More information

General Policies & Procedures. SV 5.0 Clean Harbors Vendor Code of Business Conduct and Ethics

General Policies & Procedures. SV 5.0 Clean Harbors Vendor Code of Business Conduct and Ethics 1. Purpose This Code is intended to govern the conduct of Clean Harbors, Inc. and all of its subsidiaries Vendors when doing business with or on behalf of Clean Harbors, Inc. For the purpose of this Code,

More information

Contract and Procurement Fraud. Fraud in Procurement without Competition

Contract and Procurement Fraud. Fraud in Procurement without Competition Contract and Procurement Fraud Fraud in Procurement without Competition Sole-Source Awards Noncompetitive procurement process through the solicitation of only one source Procurement through sole-source

More information

FRAUD RISK FACTORS CHECKLIST (Source: New AU Section 240, Appendix A)

FRAUD RISK FACTORS CHECKLIST (Source: New AU Section 240, Appendix A) Page 136 of 174 FRAUD RISK FACTORS CHECKLIST (Source: New AU Section 240, Appendix A) RECOGNIZING RISK FACTORS THAT SHOULD GET YOUR ATTENTION How to use the checklist: 1. Review this checklist towards

More information

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics

Computer Programs and Systems, Inc. Code of Business Conduct and Ethics (as of January 28, 2013) Introduction This sets forth the guiding principles by which we operate Computer Programs and Systems, Inc. (the Company ) and conduct our daily business with our stockholders,

More information

May 3, To the Jail Board Members and Management Western Tidewater Regional Jail Authority 2402 Godwin Blvd Suffolk, Virginia 23434

May 3, To the Jail Board Members and Management Western Tidewater Regional Jail Authority 2402 Godwin Blvd Suffolk, Virginia 23434 A PROFESSIONAL LIMITED LIABILITY COMPANY CERTIFIED PUBLIC ACCOUNTANTS May 3, 2016 To the Jail Board Members and Management Western Tidewater Regional Jail Authority 2402 Godwin Blvd Suffolk, Virginia 23434

More information

Fraud Control Policy. Enriching Futures

Fraud Control Policy. Enriching Futures Fraud Control Policy Enriching Futures Table of Contents Fraud Control Policy Statement 1 Governance And Professional Ethics Statement 2 Roles And Responsibilities 3 Fraud Prevention 4 Fraud Detection

More information

PUBLIC COMPANY ACCOUNTING OVERSIGHT BOARD

PUBLIC COMPANY ACCOUNTING OVERSIGHT BOARD 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8433 www.pcaobus.org PUBLIC COMPANY ACCOUNTING OVERSIGHT BOARD ) ) In the Matter of ) PCAOB Release No.104-2013-087

More information

Internal Auditing 101 with Panel Discussion. VGFOA Virginia Beach May 2013

Internal Auditing 101 with Panel Discussion. VGFOA Virginia Beach May 2013 Internal Auditing 101 with Panel Discussion VGFOA Virginia Beach May 2013 Introduction of Our Panel Mike Garber Partner, PBMares Jon Munch Financial Services Division Chief - Fauquier County Government

More information

CODE OF CONDUCT A MESSAGE FROM OUR CEO. Dear Colleagues:

CODE OF CONDUCT A MESSAGE FROM OUR CEO. Dear Colleagues: CODE OF CONDUCT A MESSAGE FROM OUR CEO Dear Colleagues: Few things are as important as your reputation. That s true for companies and individuals alike. Logitech s ethical reputation is the foundation

More information

Internal Financial Controls (IFC) ICAI Seminar October 8, 2016

Internal Financial Controls (IFC) ICAI Seminar October 8, 2016 Internal Financial Controls (IFC) 1 ICAI Seminar October 8, 2016 Financial Reporting Assertions 3 Effective Internal Controls over Financial Reporting All Significant Accounts considered Minor or few internal

More information

CODE OF BUSINESS CONDUCT AND ETHICS

CODE OF BUSINESS CONDUCT AND ETHICS 1 ST FRANKLIN FINANCIAL CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS Introduction This Code of Business Conduct and Ethics ( Code ) describes the basic principles of conduct that we share as officers

More information

Code of Conduct & Ethics

Code of Conduct & Ethics Code of Conduct & Ethics Interfor Code of Conduct & Ethics Contents Page 1 CEO Message A Message from our CEO 2 Our Code of 2 Conduct & Ethics Our Code of Conduct & Ethics 3 3 Guiding Principles Guiding

More information

Office of the Utah Legislative Auditor General. Fraud Prevention. Utah Government Finance Officers Association. Spring 2017 Conference

Office of the Utah Legislative Auditor General. Fraud Prevention. Utah Government Finance Officers Association. Spring 2017 Conference Office of the Utah Legislative Auditor General Fraud Prevention Utah Government Finance Officers Association Spring 2017 Conference Utah Legislative Auditor General Constitutional Charge and Authority

More information

GUIDELINES. Corporate Compliance. Kenneth D. Gibbs President & Chief Executive. Martin A. Cammer Senior Vice President & Corporate Compliance Officer

GUIDELINES. Corporate Compliance. Kenneth D. Gibbs President & Chief Executive. Martin A. Cammer Senior Vice President & Corporate Compliance Officer GUIDELINES Corporate Compliance Kenneth D. Gibbs President & Chief Executive Martin A. Cammer Senior Vice President & Corporate Compliance Officer Joyce Leahy Executive Vice President for Legal Affairs

More information

Effective implementation of COSO s new anti-fraud guidance

Effective implementation of COSO s new anti-fraud guidance Effective implementation of COSO s new anti-fraud guidance In September 2016, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) published a new Fraud Risk Management Guide (Anti-fraud

More information

Public Company Accounting Oversight Board

Public Company Accounting Oversight Board 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8433 www.pcaobus.org Report on 2008 (Headquartered in New York, New York) Issued by the Public Company Accounting

More information

Fraud Risk Management

Fraud Risk Management Fraud Risk Management Using Automated Continuous Monitoring Tools 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization use continuous and/or automated monitoring

More information

GARMIN LTD. Audit Committee Charter. (Amended and Restated as of July 25, 2014)

GARMIN LTD. Audit Committee Charter. (Amended and Restated as of July 25, 2014) GARMIN LTD. Audit Committee Charter (Amended and Restated as of July 25, 2014) I. PURPOSE The primary purpose of the Audit Committee is to oversee the accounting and financial reporting processes of Garmin

More information

Auditing Standards and Practices Council

Auditing Standards and Practices Council Auditing Standards and Practices Council PHILIPPINE STANDARD ON AUDITING 330 THE AUDITOR S PROCEDURES IN RESPONSE TO ASSESSED RISKS PHILIPPINE STANDARD ON AUDITING 330 THE AUDITOR S PROCEDURES IN RESPONSE

More information

Financial reporting: Reviewing financial information

Financial reporting: Reviewing financial information 0 0 Financial reporting: Reviewing financial information The PwC Audit Committee Guide is designed to help members of the audit committee work through their maze of responsibilities in a practical manner.

More information

Waheed Alkahtani, CFE and CCEP-I March, 2017 Copyright 2016, Saudi Aramco. All rights reserved.

Waheed Alkahtani, CFE and CCEP-I March, 2017 Copyright 2016, Saudi Aramco. All rights reserved. Global Expectations for Addressing Fraud Risk and Investigative Process Waheed Alkahtani, CFE and CCEP-I March, 2017 Copyright 2016, Saudi Aramco. All rights reserved. Agenda Saudi Aramco Fraud Risk and

More information

Audit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to:

Audit evidence. chapter. Chapter learning objectives. When you have completed this chapter you will be able to: chapter 9 Audit evidence Chapter learning objectives When you have completed this chapter you will be able to: explain the assertions contained in the financial statements explain the use of assertions

More information

Chapter 12: The Revenue Cycle

Chapter 12: The Revenue Cycle Chapter 12: The Revenue Cycle Syaiful Ali, SE., MIS., Ak. Introduction Revenue Cycles tend to be similar for all types of firms. Two subsystems perform the processing steps within the revenue cycle: The

More information

COPYRIGHTED MATERIAL. Index. Page references followed by f indicate an illustrated figure.

COPYRIGHTED MATERIAL.  Index. Page references followed by f indicate an illustrated figure. Index Page references followed by f indicate an illustrated figure. Abuse asset misappropriation, contrast, 206 207 expenses submission, 206 Abusive purchase scenario, 218 Access security databases, usage,

More information

Fighting a growing threat

Fighting a growing threat Retail and consumer goods sector analysis of PwC s 2014 Global Economic Crime Survey Fighting a growing threat 49% Nearly half of retail and consumer goods respondents say their company has experienced

More information

Internal controls over Financial Reporting Key concepts. Presentation by Jayesh Gandhi at WIRC

Internal controls over Financial Reporting Key concepts. Presentation by Jayesh Gandhi at WIRC Internal controls over Financial Reporting Key concepts Presentation by Jayesh Gandhi at WIRC Page 1 ICFR Key Concepts WIRC 28 May 2016 Agenda Scope and requirements Overview of internal controls as per

More information

Understanding Internal Controls Office of Internal Audit

Understanding Internal Controls Office of Internal Audit Understanding Internal Controls Office of Internal Audit July 2015 Objectives for this manual Provide guidance to help management understand their responsibility to ensure that internal controls are established,

More information

CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN

CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN CODE OF CONDUCT FOR DOING BUSINESS WITH LINKEDIN TABLE OF CONTENTS INTRODUCTION 1 Expectations LINKEDIN VALUES 2 MAINTAINING BUSINESS INTEGRITY 3 Anti-Corruption Competition Laws PROMOTING TRANSPARENCY

More information

INTERNATIONAL STANDARD ON AUDITING 500 AUDIT EVIDENCE CONTENTS

INTERNATIONAL STANDARD ON AUDITING 500 AUDIT EVIDENCE CONTENTS INTERNATIONAL STANDARD ON 500 AUDIT EVIDENCE (Effective for audits of financial statements for periods beginning on or after December 15, 2004) CONTENTS Paragraph Introduction... 1-2 Concept of Audit Evidence...

More information

TEEKAY TANKERS LTD. STANDARDS OF BUSINESS CONDUCT POLICY

TEEKAY TANKERS LTD. STANDARDS OF BUSINESS CONDUCT POLICY TEEKAY TANKERS LTD. STANDARDS OF BUSINESS CONDUCT POLICY WHY TEEKAY HAS STANDARDS OF BUSINESS CONDUCT As responsible business leaders, it is not enough to do things right; it is also important to do them

More information

Internal Audit Procurement Policies and Controls

Internal Audit Procurement Policies and Controls Internal Audit Procurement Policies and Controls Melissa Aw Yong 10 October 2012 SAA Global Education Centre Pte Ltd Seminar 6/7 111 Somerset Road, #06-01/02 TripleOne Somerset Singapore 238164 Agenda

More information

UNIVERSITY OF TOLEDO INTERNAL AUDIT DEPARTMENT PURCHASE CAPITAL GOODS

UNIVERSITY OF TOLEDO INTERNAL AUDIT DEPARTMENT PURCHASE CAPITAL GOODS The following control objectives provide a basis for strengthening your control environment for the process of purchasing capital goods. When you select an objective, you will access a list of the associated

More information

Code of Business Conduct and Ethics

Code of Business Conduct and Ethics Code of Business Conduct and Ethics Table of Contents Purpose... 1 Scope... 1 Policy... 2 Responsibilities... 8 Enforcement... 8 Review and Revision... 8 PURPOSE Pursuant to the Sarbanes-Oxley Act of 2002

More information

Repetitive Bidding of Duplicative Material Costs. Next Slide

Repetitive Bidding of Duplicative Material Costs. Next Slide Repetitive Bidding of Duplicative Material Costs Table of Contents Risk Assessment Research and Planning Risk Assessment Initial Review of Subcontract Proposal Preliminary Analytical Procedures Entrance

More information

Joint IIA/ ISACA/ ACFE Spring Fraud Conference: Fraud & the External Auditor, and You

Joint IIA/ ISACA/ ACFE Spring Fraud Conference: Fraud & the External Auditor, and You Joint IIA/ ISACA/ ACFE Spring Fraud Conference: Fraud & the External Auditor, and You Meeting with you today Summer Taylor, Audit Managing Director Deloitte & Touche LLP, Orange County Summer is a CPA

More information

Comparison of the PCAOB s Auditing Standards No. 5 and No. 2 (Certain key differences are highlighted by underlining)

Comparison of the PCAOB s Auditing Standards No. 5 and No. 2 (Certain key differences are highlighted by underlining) Comparison of the PCAOB s Auditing Standards No. 5 and No. 2 (Certain key differences are highlighted by underlining) Topic AS No. 5 AS No. 2 Objective of ICFR Audit Planning the ICFR Audit Integration

More information

Bribery in International Business Transactions. World Headquarters the gregor building 716 West Ave Austin, TX USA

Bribery in International Business Transactions. World Headquarters the gregor building 716 West Ave Austin, TX USA Bribery in International Business Transactions World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA IV. LIMITING LIABILITY: CORPORATE GOVERNANCE AND FRAUD PREVENTION STRATEGIES

More information

Due: Tuesday, May 1, 2007 by 5:45 p.m.

Due: Tuesday, May 1, 2007 by 5:45 p.m. A439: Advance Auditing 2007 Final exam Directions: The final exam consists of 30 multiple choice questions. Ground Rules. As a take-home exam you may use notes, the internet, auditing textbooks or other

More information

Atlas Financial Holdings, Inc. Code of Business Conduct & Ethics

Atlas Financial Holdings, Inc. Code of Business Conduct & Ethics Atlas Financial Holdings, Inc. Code of Business Conduct & Ethics TABLE OF CONTENTS 1. INTRODUCTION... 3 2. WHO IS COVERED... 3 3. DIRECTOR, OFFICER AND EMPLOYEE OBLIGATIONS... 4 4. CONFLICTS OF INTEREST...

More information

Consideration of Fraud in a Financial Statement Audit

Consideration of Fraud in a Financial Statement Audit Consideration of Fraud in a Financial Statement Audit 153 AU-C Section 240 Consideration of Fraud in a Financial Statement Audit Source: SAS No. 122; SAS No. 128. Effective for audits of financial statements

More information

AN AUDIT OF INTERNAL CONTROL THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: GUIDANCE FOR AUDITORS OF SMALLER PUBLIC COMPANIES

AN AUDIT OF INTERNAL CONTROL THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL STATEMENTS: GUIDANCE FOR AUDITORS OF SMALLER PUBLIC COMPANIES 1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org PRELIMINARY STAFF VIEWS AN AUDIT OF INTERNAL CONTROL THAT IS INTEGRATED WITH AN AUDIT OF FINANCIAL

More information

Tetney Primary School. Policy for Whistleblowing

Tetney Primary School. Policy for Whistleblowing Tetney Primary School Policy for Whistleblowing This is the Lincolnshire Policy which we have adopted. AGREED BY GOVERNORS ON SIGNED BY CHAIR TO BE REVIEWED REVIEWED ON.. REVIEWED ON.. Whistleblowing Policy

More information

Checklist for Higher Education

Checklist for Higher Education Checklist for Higher Education The following section contains a checklist addressing issues of particular relevance to higher education. The guidance is considered best practice for higher education. The

More information

Appendix 8. M&T BANK CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS

Appendix 8. M&T BANK CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS Appendix 8. M&T BANK CORPORATION CODE OF BUSINESS CONDUCT AND ETHICS Introduction. This ( Code ) covers a wide range of business practices and procedures. There are, of course, many corporate policies

More information

Whistle-blowing. Policy and Procedure

Whistle-blowing. Policy and Procedure Whistle-blowing Policy and Procedure This document will be made available in other languages and formats upon request from employees and students (or their parents/carers) Date of Issue: September 2014

More information

and Assessing the Risks of Material Misstatement through Understanding the Entity and Its Environment

and Assessing the Risks of Material Misstatement through Understanding the Entity and Its Environment IFACIAAS Board IAASB Main Agenda (April 2013) Agenda Iten 5-D Final Pronouncement March 2012 International Standard on Auditing ISA 315 (Revised), Identifying and Assessing the Risks of Material Misstatement

More information

FRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies

FRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies Proactive Fraud Auditing End of Chapter 4 in Albrecht FRAUD DETECTION Recognizing the Symptoms of Fraud Actg 537 Identify Risk Exposures 1 2 Identify Fraud Symptoms for Each Exposure Proactively Look for

More information