Forensic Data Analytics in the Payroll Environment. 6 September 2012
|
|
- Abel Ford
- 5 years ago
- Views:
Transcription
1 Forensic Data Analytics in the Payroll Environment 6 September 2012
2 Disclaimers The content of this presentation is for the purposes of providing the with information on forensic data analytics specific to the payroll environment and is strictly confidential It may not be distributed No part may be quoted, referred to or disclosed in whole or in part to any other party, or be used for any other purpose, without our prior written consent We do not accept responsibility for any loss or damage any third party may suffer as a result of utilising the information provided, resulting from your unauthorised disclosure Page2
3 Contents Background Perspective of payroll fraud and reliance on IT controls How does Forensic Data Analytics fit into Fraud Risk Management? Approach to Forensic Data Analytics Typical areas of focus Payroll Employee expenses and petrol card expenses Questions Contact Details Page3
4 Background Page4
5 What is Fraud? The Association for Certified Fraud Examiners ( ACFE ) defines fraud as any intentional or deliberate act to deprive another of property or money by guile, deception or other unfair means Page5
6 Payroll fraud Enablers, drivers and actions Main enablers of payroll fraud Adding on and paying of Ghost employees Unauthorised payments, including salary increases, bonuses, overtime, leave payouts, etc Duplicate employee records Commission, overtime and leave manipulation Overstating hours worked Main drivers of payroll fraud threats Insufficient processes, policies, procedures and/or controls Lack of segregation of duties Ineffective verification and reconciliation Key actions to mitigate payroll fraud risk Assess, improve and monitor internal controls Take precautions and improve procedures, including limit access to payroll information, strong passwords, segregation of duties, conduct reference / background checks, reconciliations and verification of employees Implementing fraud risk management strategy Page6
7 Perspective of reliance on IT Controls to detect fraud Source: ACFE 2012 Report to the Nation On Occupational Fraud Source: ACFE 2012 Report to the Nation On Occupational Fraud Page7
8 Improve Monitor Forensic Review Strategy How does Forensic Data Analytics fit into Fraud Risk Management? Assess Strategic Tactical Operational Code of Ethics Fraud Risk Assessment Other Policies and Standard Operating Procedures Fraud Related Policies Fraud Awareness Training Surprise Reviews Fraud Response Plan Legislative Compliance Whistleblower Mechanism Fraud Resistance Review Staff Vetting and Life Style Reviews Relationships between Stakeholders (internal and external) Information Repositories Walkthrough and Gap Analysis Forensic Data Analytics System Assurance and Security Third Party Compliance Physical and Information Security People Process Systems Supported by proven investigation methodology Databases Fraud investigation team Page8
9 Approach Forensic Data Analytics Page9
10 Approach Forensic Data Analytics Information And many more Page10
11 Approach Forensic Data Analytics Information (cont d) Employee Master Employee Master Bank EFT Transactions Leave and Attendance Timesheets, Overtime & Expenses Payroll Transactions Physical Access Logs Payroll System User Access Loans Audit Trail Bonuses Telephone And more Page11
12 Red flags Employees Red flags are early warning signs that may constitute irregularities, anomalies, misconduct, waste, abuse and even fraud or corruption. However, there may be valid explanations Red flags include Employee not taking leave or refusing promotion Unexplained and/or unnecessary overtime, especially over weekends. Work very early in the mornings or late at night Unreliable communication and reports Living beyond means (life style reviews) Excessive gambling, alcohol / drug problems Page12
13 Typical areas of focus Page13
14 Typical areas of focus Payroll Employee master Payroll transactions incl. EFT Leave and attendance Timesheet, overtime and expenses Bonuses Loans Payroll system user access Physical access logs Telephone Employee expenses and petrol card expenses Page14
15 Payroll Page15
16 Payroll Red Flags Creation and payment of Ghost employees Unauthorised changes to payroll transactions Unexpected employee increases Duplicate payments Abuse of leave or leave payouts Unauthorised / excessive overtime Excessive / unauthorised bonuses Collecting UIF and Union and not paying over Abuse of loans and advances Terminated employees on payroll Unauthorised / excessive absenteeism Poor administration of information, e.g. duplication of employees (permanent and casual) Non adherence to policies and procedures Lack of segregation of duties Lack of security of building / offices / computers (cyber fraud) Inadequate passwords / sharing of passwords Page16
17 Payroll Red flags ascertained via Forensic Data Analytics Employees with payroll transactions and no leave Employees with payroll transactions that are not included in the employee master Employees with payroll transactions after termination Employees with payroll transactions prior to their engagement date Employees with limited payroll transactions, e.g. for less than 3 months Employees with net pay and limited associated wages, especially when compared to other employees Employees with unexpected increases (period and percentage) Employees with net pay with round amounts or recurring digits Employees with details that match / are similar to other employee(s), e.g. bank account, address, telephone number, ID number, employee number, tax number Employees with multiple employee numbers (based on their surname and name) Employees with limited / missing information Employees with invalid ID numbers Irregular changes identified in the vendor change log, especially on bank account changes and changes in employee status (e.g. inactive - active - inactive) Changes applied over weekends, public holidays or after hours Page17
18 Payroll Example of data standardisation and normalisation Page18
19 Payroll Example of data standardisation and normalisation (cont d) Page19
20 Payroll Example of data standardisation and normalisation (cont d) Page20
21 Payroll Example of results Page21
22 Payroll Example of results (cont d) Page22
23 Employee expenses and petrol card expenses Page23
24 Employee expenses and petrol card expenses Red Flags Employee expenses Employees that approve their own expenses Employees submitting expense claims while on leave Employees submitting duplicate expense claims Employees with unauthorised expenses Petrol card transactions \ Employees with excessive petrol card transactions in terms of total value or volume Employees with unexpected relationships with specific service providers Duplicate petrol card transactions Petrol card transactions not related to fuel Employees with excessive petrol card transactions not related to fuel Employees that purchase unauthorised goods and services with their petrol cards Page24
25 Employee expenses and petrol card expenses Red flags ascertained via Forensic Data Analytics Employee expenses Identify instances where employees approve their own expenses Identify instances where the expense claim dates agree to the employee s leave dates Duplicate expenses Employees with high total volume and/or value expenses Text mining of the expense details to identify unusual terms used to describe potentially improper expenses Petrol card transactions Stratify transactions per card and per service provider to identify potential irregular volumes and values and potential unexpected relationships Duplicate petrol card transactions Petrol card transactions not related to fuel High value transactions, individually and per period High-volume / low-value transactions Unexpected types of transactions, e.g. cash withdrawals or transactions not related to maintenance and tyres Petrol card transactions related to fuel High volume and/or value transactions per filling station and per card, individually and per period Outliers on fuel transactions per card Page25
26 Questions Page26
27 Contact details Susan Breytenbach Director Direct: Mobile: Salome Coetsee Senior Manager Direct: Mobile:
Using Data Analytics to Detect Fraud
Using Data Analytics to Detect Fraud Data Analysis Tests for Detecting Payroll and Expense Reimbursement Schemes 2018 Association of Certified Fraud Examiners, Inc. Payroll Schemes Fraudsters cause their
More informationFraud Prevention and Detection Michael Schulstad, CPA/CFF/CGMA/FBI (ret)
WEALTH ADVISORY OUTSOURCING AUDIT, TAX, AND CONSULTING Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC-registered investment advisor Fraud Prevention and
More informationLaurie Beets. PDG 27 th National College & University Bursars & SFS Conference
Foiling Fraudsters Laurie Beets Oklahoma State University Acknowledgements 2006 Fraud Examiners Manual, Association of Certified Fraud Examiners (ACFE) 2012 Report to the Nation on Occupational Fraud &
More informationINTERNAL AUDIT EFFECTIVENESS. Conducting Fraud Investigations Conducting Internal Audit
INTERNAL AUDIT EFFECTIVENESS Conducting Fraud Investigations Conducting Internal Audit Conducting Fraud Investigations Why Fraud? Fraud is the product of three factors: Supply of motivated offenders; The
More informationCentral Florida Chapter Florida Government Finance Officers Association INTERNAL CONTROLS
Central Florida Chapter Florida Government Finance Officers Association INTERNAL CONTROLS 1 FRAUD Any intentional act or omission designed to deceive or mislead others and resulting in the victim suffering
More informationBanking, Payroll and Purchase: investigating financial fraud with data analytics
Banking, Payroll and Purchase: investigating financial fraud with data analytics 1 fraud investigations IDEA can be used to identify unusual and suspect transactions as part of a fraud investigation. There
More informationThis Questionnaire/Guide is intended to assist you in decision making, as well as in day-to-day operations. Best Regards,
In an effort to disseminate information and assure that we are in compliance with guidelines caused by the Sarbanes Oxley Act that proper internal controls are being adhered to, we have developed some
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure SALARIES & PAYROLL Page Analytic Name Employee names on the payroll that match a vendor PR Analytic 01 Ex-employees
More informationUse of Forensic Data Analytics in Investigations. Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN
Use of Forensic Data Analytics in Investigations Gerry Zack, CCEP, CFE, CIA CEO SCCE & HCCA Minneapolis, MN gerry.zack@corporatecompliance.org Today s Agenda 1. A framework for using analytics in compliance
More informationAUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young. Lessons on Audit Risk. Responding to fraud risk
AUDIT RISK ASSESSMENT AND RESPONSES TO ASSESSED RISK BY Geoffrey Byamugisha Partner, Ernst & Young ICPAU Page 1 COURSE CONTENT Lessons on Audit Risk Identification of audit risk and audit risk assessment
More informationFRAUD SCHEMES. South Carolina HFMA Finance & Reimbursement Forum. November 13, 2012 WITH RELATED INTERNAL CONTROLS
FRAUD SCHEMES WITH RELATED INTERNAL CONTROLS South Carolina HFMA Finance & Reimbursement Forum November 13, 2012 2 Fraud Facts: Estimated loss of 5% of annual revenues to occupational fraud Financial statement
More informationUsing Transactional Analysis for
Using Transactional Analysis for Effective Fraud Detection Date: 15 th January 2009 Nishith Seth Seth Services.P. Ltd. www.sspl.net.in Cost Indirect costs: image, morale Fraud Issues & Impact Direct costs:
More informationIntroduction to Fraud and Forensic Professional Oppurtunities for Chartered Accountants
WESTERN INDIA REGIONAL COUNCIL OF ICAI Introduction to Fraud and Forensic Professional Oppurtunities for Chartered Accountants Presented on 11 th March, 2017 By CA Vijay Kewalramani B. Com., LL. M., F.
More informationFRAUD DETERRENCE AND DETECTION
FRAUD DETERRENCE AND DETECTION Segregation of Duties Corruption Scheme Red Flags Unchecked authority to approve No formal documented procedures Circumventing normal policies and procedures Employees receiving
More informationUNCOVERING THE TRUTH WITH FORENSIC ACCOUNTING
UNCOVERING THE TRUTH WITH FORENSIC ACCOUNTING Contributed by : CA Nirav DharodVishesh Sangoi (a member of the association) he can be reached at dharodnirav99@gmail.com Competing in a rapidly changing world,
More informationNorthern Oklahoma College Tonkawa, Oklahoma
Northern Oklahoma College Tonkawa, Oklahoma Internal Audit Report INTERNAL AUDIT REPORT Table of Contents Section Page Executive Summary of Procedures Performed and Results Thereof... I 1 Expenditures...
More informationSTUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD
STUDY UNIT TEN INTERNAL AUDIT RESPONSIBILITIES FOR FRAUD 1 10.1 Fraud -- Nature, Prevention, and Detection..................................... 1 10.2 Fraud -- Indicators........................................................
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT Page Analytic Name Vendor bank details match employees bank details HR Analytic 01 Vendor
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure HUMAN RESOURCES MANAGEMENT Page Analytic Name Vendor bank details match employees bank details HR Analytic 01 Vendor
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE Page Analytic Name Duplicate payments AP Analytic 01 Duplicate invoices AP Analytic 02 Duplicate
More informationFRAUD DETECTION. Early Detection = $ Saved. Red Flag = Danger. But a symptom = FRAUD. Accounting Anomalies. Accounting Anomalies
Proactive Fraud Auditing End of Chapter 4 in Albrecht FRAUD DETECTION Recognizing the Symptoms of Fraud Actg 537 Identify Risk Exposures 1 2 Identify Fraud Symptoms for Each Exposure Proactively Look for
More informationInternal Controls. for County Recorders
Internal Controls for County Recorders Definition of Internal Controls State Board of Accounts (SBOA) defines internal control as follows: Internal control is a process executed by officials and employees
More informationPKF Forensic & Risk Services. Integrity Issues in the Australian Workforce Part 2 Integrity Corporate Governance 16 May 2017
PKF Forensic & Risk Services Integrity Issues in the Australian Workforce Part 2 Integrity Corporate Governance 16 May 2017 Agenda Integrity Issues in the Australian Workforce Recap on Part 1: Emerging
More informationFraud Awareness Jennifer Murtha Clara Ewing
Fraud Awareness Jennifer Murtha Clara Ewing The Monkey Business Illusion 2 Fraud Defined The term fraud is defined in Black's Law Dictionary (Sixth Edition, 1990) as: An intentional perversion of truth
More informationest library 1 of 13 9/2/2013 6:53 AM Home Blog About» Who uses?» Resources» Contact Us Test library A selection of s from our Members' library The library contains details on a variety of s that can be
More informationContract and Procurement Fraud
Contract and Procurement Fraud Fraud in Procurement Without Competition 2018 Association of Certified Fraud Examiners, Inc. Sole-Source Awards The procurement process is noncompetitive through the solicitation
More informationWhat Happens When Internal Controls Fail
What Happens When Internal Controls Fail 1 Your Presenters Brian Sanvidge Principal Baker Tilly Ellen Labita Partner Baker Tilly Danielle Callaci Manager Baker Tilly 2 Today s Agenda > What are Internal
More informationIIA Springfield IL Chapter
Adding Value with Data Analytics IIA Springfield IL Chapter October 14, 2010 0 Jan Beckmann, CPA, ACL Certified Trainer, ACDA jbeckmann@bswllc.com 314.983.1254 1050 N. Lindbergh Blvd. St. Louis, Missouri
More informationMIS 5208 Week 2 Fraud Detection & Prevention
MIS 5208 Week 2 Fraud Detection & Prevention Introductions, Course Outline, and Other Administration Issues Ed Ferrara, MSIA, CISSP eferrara@temple.edu Fraud Awareness & Internal Controls Awareness Internal
More informationAUDITING MOBILE MONEY AND ELECTRONIC TRANSACTIONS Presentation by:
AUDITING MOBILE MONEY AND ELECTRONIC TRANSACTIONS Presentation by: Moses Kang ethe Chief Finance Officer, Britam Life Assurance Company (Kenya) Limited Thursday, 1 st February 2018 Uphold public interest
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure ACCOUNTS PAYABLE Page Analytic Name Duplicate payments AP Analytic 01 Duplicate invoices AP Analytic 02 Duplicate
More informationFraud Risk Management
Fraud Risk Management Specific Anti-Fraud Controls (Process or Transaction Level) 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization have adequate staffing
More informationCan You Spot Fraudsters?
Can You Spot Fraudsters? CACUBO Workshop March 22, 2018 Eric Conforti, CPA, CFE 1 Who Are We? A One-Firm Firm: Over 2,200 industry experts to partner with when specific industry knowledge is needed during
More informationFraud in the Insurance Industry How it Can Impact Your Agency
A MarshBerry Publication Volume XXIX, Issue 4 APRIL 2013 Authored by Molly McCarthy, Senior Consultant 440.392.6584 email: Molly.McCarthy@MarshBerry.com Fraud in the Insurance Industry How it Can Impact
More informationRecommended mitigating controls
1. SELECTION OF APPLICANTS Overarching controls Secondary panel could review individual decisions or a sample of decisions made by the evaluation panel. Adequate training courses on ethics and integrity,
More informationAugust 2010 Guidelines for Managing the Risk of Fraud in Government.
August 2010 Guidelines for Managing the Risk of Fraud in Government www.bcauditor.com T a b l e o f C o n t e n t s The Five Principles Underpinning a Sound Fraud Risk Strategy 2 Principle 1: Understand
More informationGDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS
GDPR DATA PROCESSING NOTICE FOR FS1 RECRUITMENT UK LTD FOR APPLICANTS AND WORKERS What is the purpose of this document? FS1 Recruitment UK Ltd is committed to protecting the privacy and security of your
More informationAUDIT STATUS. Continuous Auditing Ideas and Priority Ranking Draft: 8/7/2012
Compliance Identify single day stays and subsequent re-admissions Identify inappropriate unbundling of lab tests Identify frequent use of high risk organizations Match OIG-excluded providers list with
More informationMoving the Needle: Fighting Fraud from the Inside Through Audit. Mary Breslin, CFE, CIA President Empower Audit Training and Consulting
Moving the Needle: Fighting Fraud from the Inside Through Audit Mary Breslin, CFE, CIA President Empower Audit Training and Consulting Moving the Needle Fighting Fraud from the Inside Through Audit Mary
More informationACL ESSENTIALS. Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES
ACL ESSENTIALS Get insight into your ERP process health, compliance & financial exposure TRAVEL & ENTERTAINMENT EXPENSES Page Analytic Name Split expenses TE Analytic 01 Same expense claimed by two or
More informationSMALL BUSINESS FRAUD ASSESSMENT INTERNAL CONTROL QUESTIONNAIRE Download your risk assessment form at
SMALL BUSINESS FRAUD ASSESSMENT INTERNAL CONTROL QUESTIONNAIRE Download your risk assessment form at www.businessfraudprevention.org/forms.html Owner: Date: Discussed with: Question Yes No N/A Comments
More informationMy experiences with Employee Fraud
My experiences with Employee Fraud - Capt Percy Jokhi March 18, 2008 Introduction The present industry scenario is most prone to losses due to Fraud not only associated with external agencies, but more
More informationEmployee Dishonesty: Prevention and Detection
Employee Dishonesty: Prevention and Detection Frontline Risk Management Series Welcome to this session on Employee Dishonesty, a risk management module presented by CUMIS General Insurance s Risk Solutions
More informationContract and Procurement Fraud
Contract and Procurement Fraud Performance Schemes 2018 Association of Certified Fraud Examiners, Inc. Invoicing Schemes Vendor submits fraudulent invoices to generate false payments. False invoices Inflated
More informationManaging the Business Risk of Financial Fraud for Higher Education Providers
Part II Practical lconsiderations i for Managing the Business Risk of Financial Fraud for Higher Education Providers Mark Albers Deloitte FAS LLP April 23, 2010 Discussion Themes I. Fraud Why it Matters
More informationInformation and and training provid v ed by Smith Elliott Elliott Kearns & Compan
Nuts and Bolts of Avoiding Fraud in Your Organization Information and training provided by Smith Elliott Kearns & Company, LLC as part of this Fraud Avoidance presentation is intended for reference only.
More informationAnticipated Completion: January 31, 2018.
1 The Cash Room was staffed with only one person several times during the day. 1. Cash Room staff swipe their badges each time they enter the Cash Room, even when entering with another staff member. The
More informationFraud Prevention Training
Fraud Prevention Training The Massachusetts Collectors and Treasurers Association Sixty-Sixth Annual Education Conference June 15, 2015 Presented By: Eric Demas, CFE Melanson Heath edemas@melansonheath.com
More informationAnti-Fraud Programs and Control Policy
Anti-Fraud Programs and Control Policy OVERVIEW This document provides an overview of the programs and controls Tahoe Resources Inc. ( Tahoe ) follows in order to evaluate fraud risk as it pertains to
More informationModule 1: Safeguarding District Resources: Roles & Responsibilities
Module 1: Safeguarding District Resources: Roles & Responsibilities Presenter: Jamie P. McPherson Leadership Development Manager New School Board Member Mandated Training Day Two: Fiscal Oversight Training
More informationInternal Control Evaluation
INTERNAL CONTROL EVALUATION Adapted from a checklist created by Jackie F. Breland, CPA (www.jackiebreland.com) Organization: Date Prepared or Updated: Prepared by: Introduction The purpose of this checklist
More informationIncreasing Your Awareness of Fraud: Definitions, Roles and Responsibilities, Methodologies and Tools
Increasing Your Awareness of Fraud: Definitions, Roles and Responsibilities, Methodologies and Tools Cherilyn Montminy, CMA CFE CRMA Audit Manager Internal Audit and Evaluation Bureau Presentation for
More informationEric Kinsherf, CPA MMAAA Conference June 12, 2018
Eric Kinsherf, CPA MMAAA Conference June 12, 2018 Agenda Overview What is Fraud? How does Fraud happen? How to Detect and Prevent Fraud Summarize Objectives Gain better Understanding of Fraud Risk Illustrate
More informationPresented by Ed Williamson and Erica Bailey
Presented by Ed Williamson and Erica Bailey Internal Controls & Fraud Detection Objectives Background on internal controls Review of organizational and functional level controls Fraud prevention and risk
More informationFraud Detection and Prevention
Fraud Detection and Prevention Presented by: Louise Hanson, Moss Adams LLP Emily Ogden, Moss Adams LLP April 24, 2014 1 DISCLOSURE STATEMENT The material appearing in this presentation is for informational
More informationManaging Fraud Risks. Procurement & Contacting. John J. Hall, CPA (970)
Managing Fraud Risks in Procurement & Contacting The IIA Los Angeles Chapter October 2, 2017 John J. Hall, CPA (970) 926-0355 John@JohnHallSpeaker.com 1 Four Categories 1. Theft 2. Results Manipulation
More informationDutchess County Department of Planning and Community Development Division of Mass Transit January 2007 December 2008
Dutchess County Department of Planning and Community Development Division of Mass Transit January 2007 December 2008 COMPTROLLER S SUMMARY... 2 Organization and Background... 2 Audit Scope, Objective and
More informationPAYROLL AND PERSONNEL CYCLE
TOPIC 7 PAYROLL AND PERSONNEL CYCLE TOPIC OVERVIEW With human resources and payroll departments under more pressure than ever before, a modern automated payroll solution is essential for any business.
More informationContract and Procurement Fraud. Fraud in Procurement without Competition
Contract and Procurement Fraud Fraud in Procurement without Competition Sole-Source Awards Noncompetitive procurement process through the solicitation of only one source Procurement through sole-source
More informationSUGGESTED SOLUTIONS Audit and Assurance. Certificate in Accounting and Business II Examination March 2014
SUGGESTED SOLUTIONS 06204 - Audit and Assurance Certificate in Accounting and Business II Examination March 2014 THE INSTITUTE OF CHARTERED ACCOUNTANTS OF SRI LANKA All Rights Reserved Answer No. 01 (i)
More informationInternal Audit. Audit of Procurement and Contracting
Internal Audit Audit of Procurement and Contracting June 2011 Table of Contents EXECUTIVE SUMMARY...5 1. INTRODUCTION...8 1.1 BACKGROUND...8 1.2 OBJECTIVES...9 1.3 SCOPE...9 1.4 METHODOLOGY AND APPROACH...9
More informationCHAPTER 5 INFORMATION TECHNOLOGY SERVICES CONTROLS
5-1 CHAPTER 5 INFORMATION TECHNOLOGY SERVICES CONTROLS INTRODUCTION In accordance with Statements on Auditing Standards Numbers 78 and 94, issued by the American Institute of Certified Public Accountants
More informationIntegrating COSO s Fraud Risk Management Guide on an Enterprise Scale
Integrating COSO s Fraud Risk Management Guide on an Enterprise Scale September 15, 2017 Vincent Walden Partner EY Atlanta Delores White Director, Internal Audit Southern Company Scott Hulsey Chief Compliance
More informationFraud Prevention and Detection for IT Professionals
Fraud Prevention and Detection for IT Professionals Netsecure 2011 Conference Sandra Rolnicki Senior Vice President, March 2011 Contents (1) Introduction to fraud concepts (2) How control weaknesses are
More informationAgenda. P-Card Misuse and Fraud 9/18/2017
P-Card Misuse and Fraud Presenter Victor Griego, CPA Internal Auditor 3 University of New Mexico Agenda What is a P Card? Advantages of P Cards Risks of P Cards Internal Controls for P Cards Red Flags
More informationBFSv9 Internal Controls Guidance
presented by: Hans Gude, MBA, CIA Barbara VanCleave Smith, PhD, CPA Office of Ethics, Compliance, and Risk Management Presented May 10 and 17, 2010 LMS Course Number BECTR306 1 Today s Topics 1. Overview
More informationADMINISTRATIVE RESPONSIBILITIES FOR UNIVERSITY AND COLLEGE ADMINISTRATORS, DEPARTMENT HEADS, AND DIRECTORS
ADMINISTRATIVE RESPONSIBILITIES FOR UNIVERSITY AND COLLEGE ADMINISTRATORS, DEPARTMENT HEADS, AND DIRECTORS Internal Controls & Your Role 1) Internal Accounting Controls - procedures that ensure compliance
More informationFraud Control Plan 2016
2016 Issue Date: September 2015 November 2016 Review Date: November 2018 Statement of Principle Dunedin Kindergartens Incorporated, trading as Dunedin Kindergartens, is entrusted by the community and
More informationDISCIPLINARY RULES FOR EMPLOYEES
DISCIPLINARY RULES FOR EMPLOYEES DISCIPLINARY RULES FOR EMPLOYEES Page Introduction... 1 Gross misconduct... 2 Theft and dishonesty... 2 Failure to undertake the requirements of the job... 3 Breach of
More informationHuman Resource Information Systems. Risks and Controls
Human Resource Information Systems Risks and Controls Better Practice Guide March 2011 ISBN No. 0 642 81168 7 Commonwealth of Australia 2011 Copyright Information This work is copyright. Apart from any
More informationInternal Controls Overview
UMBC Management Advisory Services Internal Controls Overview /mas What Is Internal Control? A process designed to provide reasonable assurance regarding the achievement of the following objectives: Effectiveness
More informationReducing fraud, bribery and corruption in your private business: 6 things you can do now
Reducing fraud, bribery and corruption in your private business: 6 things you can do now 1 With an increased focus on global commitments to mitigate fraud, bribery and corruption, there remains an ongoing
More informationIn addition, Angel is not involved in any regulated industry, accordingly, industry or regulatory factors are also not factors leading to the risk.
SECTION A CASE QUESTIONS (Total: 50 marks) Answer 1(a) The risks of material misstatements at the financial statement level refer to risks of material misstatements that relate pervasively to the financial
More informationINTERNAL CONTROLS. Revision A
INTERNAL CONTROLS Internal Controls Approved. CHANGE HISTORY Sections Affected/Description of Change Section All: Consolidate original document and all changes approved Through ; standardize formatting
More informationWeek 3: Fraud, Procure to Pay Process Controls
Edward Beaver Edward.Beaver@temple.edu ff MIS 5121: Business Processes, ERP Systems & Controls Week 3: Fraud, Procure to Pay Process Controls Video: Record the Class Discussion v Something really new,
More informationEffective implementation of COSO s new anti-fraud guidance
Effective implementation of COSO s new anti-fraud guidance In September 2016, the Committee of Sponsoring Organizations of the Treadway Commission (COSO) published a new Fraud Risk Management Guide (Anti-fraud
More informationOVERVIEW. Common Personality Traits of Fraudsters. Common Sources of Pressure. Changes in Behavior
Red Flags of Fraud OVERVIEW Red Flags of Fraud are warning signs that may indicate a higher fraud risk. They are NOT evidence that fraud is actually occurring. Many employees demonstrate one or more of
More informationGuide to using the work papers
This audit plan template provides an easy to use format that can be used to document the audit plan for the assignment. It is intended that the template would be used in conjunction with the Institute
More informationOCCUPATIONAL FRAUD IN GOVERNMENT AND STEPS TO PREVENT AND DETECT IT
OCCUPATIONAL FRAUD IN GOVERNMENT AND STEPS TO PREVENT AND DETECT IT This session will explore government fraud risks as well as common areas of abuse and corresponding red flags. It will also provide ideas
More informationInternal Control Program
DFA Conversations Office of the University Controller Internal Control Program November 20, 2017 Introduction Bill Sibert, University Controller Erica Jessup, Senior Financial Analyst Phil Turke, Payroll
More informationUNIVERSITY OF CALIFORNIA, SAN FRANCISCO AUDIT AND ADVISORY SERVICES
, SAN FRANCISCO AUDIT AND ADVISORY SERVICES UCSF Health Sterile Processing Department Time Reporting and Related Payroll Activities Project #16-046 September 2015 University of California San Francisco
More informationFinancial Statement Close Process
Financial Statement Close Process Process Control Objective Risk Control Considerations Segregation of Duties Accounting functions are properly segregated. Unauthorized and inaccurate transactions may
More informationResults in Brief. Audit of WMATA s Vendor Master File (VMF) OIG January 18, 2019
Results in Brief OIG 19-06 January 18, 2019 Why We Did This Review The VMF is a foundational element of the Accounts Payable and Procurement processes. The VMF contains vital information about vendors
More informationResults in Brief. Audit of WMATA s Vendor Master File (VMF) OIG January 18, 2019
Results in Brief OIG 19-06 January 18, 2019 Why We Did This Review The VMF is a foundational element of the Accounts Payable and Procurement processes. The VMF contains vital information about vendors
More informationInternal Oversight Division Audit Approach for Continuous Auditing
Internal Oversight Division Audit Approach for Continuous Auditing July 24, 2014 TABLE OF CONTENTS 1. INTRODUCTION... 3 2. OBJECTIVES... 3 3. AUDIT APPROACH... 4 4. IOD IDENTIFICATION OF KEY CONTROLS AND
More informationACCA Certified Accounting Technician Examination Paper T8 (INT) Implementing Audit Procedures (International Stream)
Answers ACCA Certified Accounting Technician Examination Paper T8 (INT) Implementing Audit Procedures (International Stream) December 2010 Answers Section A NOTES Part Answer See Note Below 1 C 1 2 D 2
More informationOPERATIONAL RISK EXAMINATION TECHNIQUES
OPERATIONAL RISK EXAMINATION TECHNIQUES 1 OVERVIEW Examination Planning Oversight Policies, Procedures, and Limits Measurement, Monitoring, and MIS Internal Controls and Audit 2 Risk Assessment: Develop
More informationFraud Risk Management
Fraud Risk Management Using Automated Continuous Monitoring Tools 2017 Association of Certified Fraud Examiners, Inc. Discussion Questions 1. Does your organization use continuous and/or automated monitoring
More informationPayroll Certified Administrator (PCA) Schedule & Booking Form
Payroll Certified Administrator (PCA) Schedule & Booking Form By completing our five 1- day Sage Pastel Payroll & HR training courses within a 6 month period and obtaining the Sage Pastel Payroll & HR
More informationData integrity forensics Bring transparency and trust to third-party data use
Legal, Compliance and Technology Webcast Series Sponsored by EY Forensic & Integrity Services Bring transparency and trust to third-party data use 24 October 2018 Today s speakers Moderator: Eric Derk
More informationInternal Audit Report. Jackson County Payroll Testing Special Pay Codes June 13, 2011
Internal Audit Report Jackson County Payroll Testing Special Pay Codes 2010-11 June 13, 2011 Presented To The Jackson County Board of Commissioners By The Internal Audit Program Audit Team Debbie Taylor,
More informationVirginia Association of School Business Officers Getting Reacquainted with Internal Controls Presented by John S. Aldridge, CPA
Virginia Association of School Business Officers Getting Reacquainted with Internal Controls Presented by John S. Aldridge, CPA Introduction What are internal controls? Simple Definition Internal control
More informationOversight using Data Analytics
Oversight using Data Analytics MACPA Government and Not-for-Profit Conference April 17, 2015 Overview Data Analytics in Government Applications in Grant Oversight Applications in Purchase Card Oversight
More informationCode of Conduct. Human Resources Policies and Procedures. UCD/HRO/Conduct/048
1NHSBT Code of Conduct UCD/HRO/Conduct/048 Version Issued: February 2013v1.1 Human Resources Policies and Procedures Code of Conduct UCD/HRO/Conduct/048 1 Policy UCD/HRO/Conduct/048 Title NHSBT Code of
More informationWaheed Alkahtani, CFE and CCEP-I March, 2017 Copyright 2016, Saudi Aramco. All rights reserved.
Global Expectations for Addressing Fraud Risk and Investigative Process Waheed Alkahtani, CFE and CCEP-I March, 2017 Copyright 2016, Saudi Aramco. All rights reserved. Agenda Saudi Aramco Fraud Risk and
More informationTen Payment Fraud Protections
Ten Payment Fraud Protections 1. Payee Positive Pay a. Provided by banks b. Banks match check serial numbers and dollar amounts against a company provided list of checks issued and only pays those checks
More informationDISCIPLINARY POLICY. Date Signature DA Approved Nov 2015 CC Review Nov 2017 Review Nov 2019 Review Nov 2021 Review Nov 2023
DISCIPLINARY POLICY Date Signature DA Approved Nov 2015 CC Review Nov 2017 Review Nov 2019 Review Nov 2021 Review Nov 2023 1 Disciplinary Policy The purpose of the disciplinary policy is to encourage all
More informationFollow-Up on VFM Section 3.13, 2016 Annual Report RECOMMENDATION STATUS OVERVIEW
Chapter 1 Section 1.13 Supply Chain Ontario and Procurement Practices Follow-Up on VFM Section 3.13, 2016 Annual Report RECOMMENDATION STATUS OVERVIEW # of Status of Actions Recommended Actions Fully In
More informationbasic ideas 2 Chapter 8 Systems work:
Chapter 8 Systems work: basic ideas 2 Learning objectives To explain the nature and role of application controls and describe the main features of these controls. To distinguish between systems-development/maintenance
More informationThen enter your PIN, also created during the enrollment process. After entering this data, select Submit.
The screens you will see in this guide were made for demo purposes, and may contain unrealistic payment or payee information. If you have questions not addressed in the tutorial, contact your Bill Pay
More information