THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR

Size: px
Start display at page:

Download "THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR"

Transcription

1 THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

2 TABLE OF CONTENTS I. INTRODUCTION Video Supplement... 1 Course Objectives and Overview... 1 Definition of Fraud... 2 Elements of Fraud... 2 Types of Victims... 3 Fraud Statistics... 3 Profile of Fraud Offenders... 4 Video... 5 Review Questions... 6 II. FUNDAMENTALS OF FRAUD Legal Elements of Fraud... 9 Criminal Versus Civil Fraud... 9 Subclassification of Internal Fraud Schemes Misappropriation Stages Types of Concealment Detecting Fraud Tips and Complaints Weaknesses in Internal Controls Video Behavioral Changes Lifestyle Changes Video Review Questions III. FRAUD AUDITING METHODOLOGY Fraud Auditing Auditing Versus Fraud Examination Fraud Theory Analyzing Available Data Creating a Hypothesis Testing the Hypothesis Refining and Amending the Hypothesis Steps in Fraud Examination Document Examination Neutral Third-Party Witnesses Corroborative Witnesses Co-Conspirators Potential Suspect Elements of Fraud Auditing The Environment The Accounting System Various Detection Techniques Financial Statements Video i

3 III. FRAUD AUDITING METHODOLOGY (CONT.) Net-Worth Methods Review Questions IV. AUDITORS RESPONSIBILITIES Introduction Certified Fraud Examiners Responsibilities Help Resolve Allegations of Fraud Obtain Evidence Take Statements Write Reports Testify to Findings Assist in the Detection and Prevention of Fraud External Auditors Responsibilities AU Section 240 Consideration of Fraud in a Financial Statement Audit PCAOB Auditing Standard No. 5 An Audit of Internal Control over Financial Reporting That Is Integrated with an Audit of Financial Statements PCAOB Auditing Standard No. 3 Audit Documentation AU Section 230 Audit Documentation Internal Auditors Fraud-Related Responsibilities Standard 1210 Proficiency Standard 1220 Due Professional Care Standard 2060 Reporting to Senior Management and the Board Standard 2110 Governance Standard 2120 Risk Management Standard 2130 Control Standard 2210 Engagement Objectives The IIA s IPPF Practice Guide: Internal Auditing and Fraud Review Questions V. CASH SCHEMES Introduction Skimming Voids and Under-Rings Swapping Checks for Cash Alteration of Cash Receipts Documentation Fictitious Refunds and Discounts Journal Entries Kiting Video Cash Fraud Detection Methods Bank Reconciliations Cut-Off Statements Surprise Cash Counts Customer Complaints Altered or Missing Documents Fictitious Refunds or Discounts ii

4 V. CASH SCHEMES (CONT.) Journal Entry Review Review and Analysis of Gross Sales and Returns and Allowances Analytical Review Deposit Dates Cash Advances Voids and Refunds by Employee Identification Cash Fraud Prevention Methods Segregation of Duties Assignment Rotation and Mandatory Vacations Surprise Cash Counts Review Questions VI. ACCOUNTS RECEIVABLE SCHEMES Introduction Lapping Fictitious Accounts Receivable Old or Written-Off Accounts Receivable Borrowing Against Accounts Receivable Video Accounts Receivable Fraud Detection Matching Deposit Dates Confirmations Accounting Cut-Off Analysis Trend Analysis on Written-Off Accounts Receivable Tracking System Accounts Receivable Fraud Prevention Segregation of Duties Lock-Box Arrangements Objective, Sales-Based Compensation Plans Review Questions VII. INVENTORY SCHEMES Introduction Theft of Inventory Larceny Video Appropriating Inventory for Personal Use (Theft) Theft of Scrap Proceeds Charging Embezzlements to Inventory Video Inventory Fraud Detection Statistical Sampling Physical Inventory Counts Analytical Review Computer-Generated Trend Analysis Inventory Fraud Prevention Proper Documentation iii

5 VII. INVENTORY SCHEMES (CONT.) Segregation of Duties Video Independent Checks Physical Safeguards Review Questions VIII. PURCHASING SCHEMES Introduction Fictitious Invoices Overbilling Schemes Checks Payable to Employees Conflicts of Interest Detecting Purchasing Schemes Analytical Review Statistical Sampling Vendor or Outside Complaints Site Visits and Observation Preventing Purchasing Schemes Education Compensation Other Measures Review Questions IX. INVESTMENT AND FIXED ASSET SCHEMES Introduction Investments Detecting Investment and Fixed-Asset Schemes Investments Fixed Assets Preventing Investment and Fixed Asset Schemes Custody of the Assets Approval to Sell or Dispose of Assets Control Over Physical Disposition of Assets Receipt of Sale Proceeds Periodic Physical Inspections Review Questions X. PAYROLL AND PERSONAL EXPENSE SCHEMES Introduction Payroll Fraud Ghost Employees Falsified Hours and Salary Schemes Commission Schemes Video Video Detecting Payroll Schemes Independent Payroll Distribution iv

6 X. PAYROLL AND PERSONAL EXPENSE SCHEMES (CONT.) Analysis of Payee Address or Accounts Screening for Duplicate Social Security Numbers Overtime Authorizations Detecting Commission Schemes Analysis of Deductions from Payroll Checks Preventing Payroll Schemes Segregation of Duties Video Periodic Review and Analysis of Payroll Personal Expense Reimbursement Detecting Personal Expense Schemes Review and Analysis of Expense Accounts Detail Review of Expense Reimbursements Preventing Personal Expense Schemes Strong Ethics Policy Detailed Expense Reports: Submission and Review Video Review Questions XI. BRIBERY AND CORRUPTION SCHEMES Introduction Bribery Illegal Gratuity Collusion Conflict of Interest Bribery and Corruption Schemes Kickbacks Gifts and Gratuities Methods of Making Illegal Payments Video Detection of Bribery and Corruption Schemes The Corrupt Recipient The Corrupt Payer Review Questions XII. THEORY OF FRAUD PREVENTION Introduction The Cressey Study Pressure Opportunity Rationalization Minimizing Pressures Have an Open-Door Policy Management s Attitudes Employee Support Programs Minimizing Opportunities Management Oversight v

7 XII. THEORY OF FRAUD PREVENTION (CONT.) Job Rotation Proactive Audit Policy Well-Defined and Understood Fraud Reporting Program Minimizing Rationalizations An Educational Program Written Ethics Policy Dishonest Acts Will Be Punished Video Create a Low-Fraud Environment Review Questions XIII. FRAUD ASSESSMENT QUESTIONING TECHNIQUES Introduction Questions and Responses Review Questions XIV. PRACTICAL PROBLEMS Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem XV. APPENDIX A: SAMPLE FRAUD POLICY XVI. APPENDIX B: FRAUD RISK CHECKLIST XVII. APPENDIX C: VIDEO TRANSCRIPTS XVIII. SOLUTIONS TO REVIEW QUESTIONS I. Introduction II. Fundamentals of Fraud III. Fraud Auditing Methodology IV. Auditors Responsibilities V. Cash Schemes VI. Accounts Receivable Schemes VII. Inventory Schemes VIII. Purchasing Schemes IX. Investment and Fixed Asset Schemes X. Payroll and Personal Expense Schemes XI. Bribery and Corruption Schemes XII. Theory of Fraud Prevention XIII. Fraud Assessment Questioning Techniques vi

8 XVII. SOLUTIONS TO PRACTICAL PROBLEMS Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem XX. FINAL EXAMINATION... E-1 XXI. INDEX... I-1 vii

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA : THE BASICS OF ASSET MISAPPROPRIATION GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 1 Introduction

More information

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION : THE BASICS OF ASSET MISAPPROPRIATION World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 3 Introduction

More information

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION (NO )

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION (NO ) : THE BASICS OF ASSET MISAPPROPRIATION (NO. 99-5402) TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 3 Asset Misappropriations... 5 ACFE s Occupational Fraud and Abuse Survey...

More information

FRAUD-RELATED INTERNAL CONTROLS

FRAUD-RELATED INTERNAL CONTROLS GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS I. THE NEED FOR INTERNAL CONTROLS Example... 1 Threats to an Organization s Internal Control Environment...

More information

Small Business FRAUD PREVENTION Manual

Small Business FRAUD PREVENTION Manual Small Business FRAUD PREVENTION Manual TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud

More information

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

THE SMALL BUSINESS FRAUD PREVENTION MANUAL THE SMALL BUSINESS FRAUD PREVENTION MANUAL TABLE OF CONTENTS PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud to Small

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

PEM Contents Checklist

PEM Contents Checklist Contents Checklist PEM Contents Checklist Below is a detailed listing of the entire contents for Update #41 dated September 2008. This is provided to allow subscribers to ensure that their binder(s) are

More information

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

A Framework for Managing Crime and Fraud

A Framework for Managing Crime and Fraud A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic

More information

2 New Company Setup OBJECTIVES:

2 New Company Setup OBJECTIVES: 2 New Company Setup In Chapter 2 of Accounting Fundamentals with QuickBooks Online Essentials Edition, you will learn how to use the software to set up your business. New Company Setup includes selecting

More information

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

Charting the Course... Certified Information Systems Auditor (CISA) Course Summary Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business

More information

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018 SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina

More information

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS

RISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7

More information

List of Modules with its Forms and Reports (IFW Campus ERP - EduTech)

List of Modules with its Forms and Reports (IFW Campus ERP - EduTech) List of Modules with its Forms and Reports (IFW Campus ERP - EduTech) 1. MASTER MODULE i. CODE MASTER ii. DEPARTMENT MASTER iii. ROOM MASTER iv. COURSE MASTER v. COMPANY MASTER vi. COLLEGE MASTER vii.

More information

Definition of Internal Control

Definition of Internal Control Definition of Internal Control - To address and limit potential risks - designed, implemented and maintained by those charged with governance to provide reasonable assurance about the achievement of the

More information

Running QuickBooks 2008 Premier Editions

Running QuickBooks 2008 Premier Editions Running QuickBooks 2008 Premier Editions Kathy Ivens CPA911 Publishing, LLC Philadelphia PA Running QuickBooks 2008 Premier Editions ISBN Number 10-digit: 1-932925-03-1 13-digit: 978-1-932925-03-6 Published

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",

More information

Fraud awareness & Information pack for ANZ Customers

Fraud awareness & Information pack for ANZ Customers Fraud awareness & Information pack for ANZ Customers 2 INTRODUCTION IS FRAUD THE SILENT PARTNER IN YOUR BUSINESS? If fraud was a country it would rate as the fifth largest economy in the world - according

More information

Exposure Draft The Auditor s Responsibility to Consider Fraud in an Audit of Financial Statements

Exposure Draft The Auditor s Responsibility to Consider Fraud in an Audit of Financial Statements Chartered Accountants of Canada Comptables agréés du Canada The Canadian Institute of Chartered Accountants 277 Wellington Street West Toronto, Ontario Canada M5V 3H2 Tel: (416) 977-3222 Fax: (416) 977-8585

More information

CASH MANAGEMENT TRAINING FY2018

CASH MANAGEMENT TRAINING FY2018 CASH MANAGEMENT TRAINING FY2018 Katie Mahoney katherine.mahoney@maine.edu 780-4484 The Office of Finance & Administration University of Southern Maine University of Maine System - 1 - Cash Collection The

More information

Risk Management in Electronic Banking: Concepts and Best Practices

Risk Management in Electronic Banking: Concepts and Best Practices Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface

More information

Q3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below.

Q3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below. Q1. What is DuitNow? DuitNow is a new real-time online fund transfer service that allows consumers and business owners to transfer money using an ID called DuitNow ID instead of having to exchange bank

More information

INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION

INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION IMS Securities, Inc. Member FINRA/SIPC IMS Financial Advisors, Inc. INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION The Firm and you are subject to a multitude of laws and regulations governing

More information

Audit Considerations Relating to an Entity Using a Service Organization

Audit Considerations Relating to an Entity Using a Service Organization An Entity Using a Service Organization 355 AU-C Section 402 Audit Considerations Relating to an Entity Using a Service Organization Source: SAS No. 122; SAS No. 128; SAS No. 130. Effective for audits of

More information

Contents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE

Contents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE Contents Foreword Recommended Reading Syllabus Chapter-heads iii v vii ix MODULE I : Technology in bank CHAPTER 1 Banking Environment and Technology u Introduction 3 u Evolution of Banking Technology over

More information

CITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.

CITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page. CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)

More information

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction Scope of

More information

Charitable Registration User Guide

Charitable Registration User Guide Charitable Registration User Guide Table of Contents Chapter 1 Online Charitable Registration... 3 A. Creating an Account... 3 I. Employer Identification Number (EIN)... 3 II. Step 2: Create Account...

More information

Prevention of Identity Theft in Student Financial Transactions AP 5800

Prevention of Identity Theft in Student Financial Transactions AP 5800 Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to

More information

QuickBooks Basics Level III

QuickBooks Basics Level III Page1 QuickBooks Basics Level III Part VII Handling the Money Payments and deposits Recording Customer Payments If a payment is received at the time of the sale, QuickBooks automatically records the customer

More information

CITADEL INFORMATION GROUP, INC.

CITADEL INFORMATION GROUP, INC. CITADEL INFORMATION GROUP, INC. The Role of the Information Security Assessment in a SAS 99 Audit Stan Stahl, Ph.D. President Citadel Information Group, Inc. The auditor has a responsibility to plan and

More information

Government-issued identification numbers (e.g., tax identification numbers)

Government-issued identification numbers (e.g., tax identification numbers) Privacy Policy This Privacy Policy explains how the ACMI collects, uses, shares and safeguards Personal Data and Non- Personal Data on www.acmiart.org, mobile websites, microsites, mobile applications,

More information

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS SRI LANKA STANDARD 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after 01 January 2014) CONTENTS Paragraph Introduction Scope of this SLAuS... 1 External

More information

GRC SURVEY RESULT Please indicate your profession

GRC SURVEY RESULT Please indicate your profession COPENHAGEN?=! CO?=! MPLIANCE T o p i c a l a n d T i m e l y Riskability GRC Controllers Governance, Risk & Compliance COPENHAGEN?=! CHARTER Bribery, Fraud & Corruption GRC SURVEY RESULT. Please indicate

More information

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection

More information

International Standard on Auditing (Ireland) 505 External Confirmations

International Standard on Auditing (Ireland) 505 External Confirmations International Standard on Auditing (Ireland) 505 External Confirmations MISSION To contribute to Ireland having a strong regulatory environment in which to do business by supervising and promoting high

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized

More information

LIST OF SUBSTANTIVE CHANGES AND ADDITIONS. PPC's Guide to Audits of Local Governments. Thirty first Edition (February 2016)

LIST OF SUBSTANTIVE CHANGES AND ADDITIONS. PPC's Guide to Audits of Local Governments. Thirty first Edition (February 2016) Route To: Partners Managers Staff File LIST OF SUBSTANTIVE CHANGES AND ADDITIONS PPC's Guide to Audits of Local Governments Thirty first Edition (February 2016) Highlights of This Edition The following

More information

CITY UNIVERSITY OF NEW YORK. i. Visit:

CITY UNIVERSITY OF NEW YORK. i. Visit: CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the

More information

Privacy Notice. General Information Protection Regulation ( GDPR )

Privacy Notice. General Information Protection Regulation ( GDPR ) Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise

More information

DIPLOMA COURSE IN INTERNAL AUDIT

DIPLOMA COURSE IN INTERNAL AUDIT DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at

More information

Learning Objectives. External confirmations procedures as per SA330 and SA 500 requirements

Learning Objectives. External confirmations procedures as per SA330 and SA 500 requirements CA. Sudhir Sharma 1 Learning Objectives 1 2 3 4 External confirmations procedures as per SA330 and SA 500 requirements Management s refusal to allow auditor to send confirmation requests Results of the

More information

STATE OF MINNESOTA PROFESSIONAL FUNDRAISER SOLICITATION NOTICE INSTRUCTIONS

STATE OF MINNESOTA PROFESSIONAL FUNDRAISER SOLICITATION NOTICE INSTRUCTIONS Mail To: Minnesota Attorney General s Office Charities Division 445 Minnesota Street, Suite 1200 St. Paul, MN 55101-2130 Website Address: www.ag.state.mn.us/charity STATE OF MINNESOTA PROFESSIONAL FUNDRAISER

More information

Annexure I: Contact Details:

Annexure I: Contact Details: Ref: CO/IT-BPR/CSC Date:.09.2017 Annexure I: Contact Details: a) Name of the company b) Company s address in India c) Contact person d) Telephone no. e) Fax f) E-mail address g) Service tax registration

More information

FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions

FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions Public Sector Best Practices that Protect the Citizens against Financial Losses, Waste and Fraud Using Advanced Controls FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation

More information

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019

Learning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019 Learning with the IIA Refreshing the profession: The New Internal Auditor Jan Olivier 6 February 2019 Contents title Qualifications framework CIA syllabus update Learning support Qualifications framework

More information

Auditing and assurance

Auditing and assurance Auditing and assurance Higher School of Economics, ICEF Lecturer: Anna Pirozhkova Seminars: Tatiana Shurchkova Contacts +7 (916) 468 33 99 (Anna), ann.pirozhkova@gmail.com Target audience 4th Year students.

More information

Online Trade License System User Manual

Online Trade License System User Manual GUWAHATI MUNICIPAL CORPORATION Online Trade License System User Manual 7/5/2017 Version no. 1.0 TABLE OF CONTENTS INTRODUCTION... 2 USER MANUAL - CITIZEN... 3 USER MANUAL - OPERATOR... 16 USER MANUAL DEALING

More information

Bank Reconciliation Release 2015

Bank Reconciliation Release 2015 Bank Reconciliation Release 2015 Disclaimer This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin

Chapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin Chapter 08 Consideration of Internal Control in an Information Technology Environment McGraw-Hill/Irwin Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved. Nature of IT Based Systems

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Testing Period. Basics of the Enrolled Agent Exam TAX PREPARER LEARNING SYSTEMS, LLC

Testing Period. Basics of the Enrolled Agent Exam TAX PREPARER LEARNING SYSTEMS, LLC 2018-19 Testing Period Basics of the Enrolled Agent Exam TAX PREPARER LEARNING SYSTEMS, LLC Introduction and General Information What is an Enrolled Agent? An enrolled agent is a person who has earned

More information

TOURISM REGULATORY AUTHORITY VACANCIES

TOURISM REGULATORY AUTHORITY VACANCIES TOURISM REGULATORY AUTHORITY VACANCIES Tourism Regulatory Authority (TRA) is a state corporation established under Tourism Act No. 28 of 2011 to regulate, manage and provide strategic direction to the

More information

International Standard on Auditing (UK) 505

International Standard on Auditing (UK) 505 Standard Audit and Assurance Financial Reporting Council July 2017 International Standard on Auditing (UK) 505 External Confi rmations The FRC s mission is to promote transparency and integrity in business.

More information

OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011

OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011 INTERNATIONAL FEDERATION OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011 HISTORY OF THE IIA 1941 Founded in New York City 1944 First chapter outside the US chartered in Toronto 1948 First chapters outside

More information

Building a Privacy Management Program

Building a Privacy Management Program Building a Privacy Management Program February 26, 2013 Office of the Information and Privacy Commissioner of Alberta Session Overview Reasons for having a PMP Strategies to deal with current and future

More information

The CIA Challenge Exam. August 2018

The CIA Challenge Exam. August 2018 The CIA Challenge Exam August 2018 The IIA is committed to providing a clearly defined, professionally relevant suite of global certifications to support internal auditors as they progress through their

More information

UNIVERSITI SAINS MALAYSIA. CIT502 Object-Oriented Programming and Software Engineering

UNIVERSITI SAINS MALAYSIA. CIT502 Object-Oriented Programming and Software Engineering UNIVERSITI SAINS MALAYSIA First Semester Examination Academic Session 2003/2004 September/October 2003 CIT502 Object-Oriented Programming and Software Engineering Duration : 3 hours INSTRUCTION TO CANDIDATE:

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

Oracle Financials RXi Reports Administration Tool

Oracle Financials RXi Reports Administration Tool Oracle Financials RXi Reports Administration Tool User Guide Release 11i May, 2000 Part No. A81232-02 Oracle Financials RXi Reports Administration Tool User Guide, Release 11i Part No. A81232-02 Copyright

More information

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS COURSE INTRODUCTION Course Objective... xi Course Overview... xi Learning Objectives...xii I. CONSUMER FRAUD

More information

CYMA IV. Accounting for Windows. CYMA IV Getting Started Guide. Training Guide Series

CYMA IV. Accounting for Windows. CYMA IV Getting Started Guide. Training Guide Series CYMA IV Accounting for Windows Training Guide Series CYMA IV Getting Started Guide November 2010 CYMA Systems, Inc. 2330 West University Drive, Suite 4 Tempe, AZ 85281 (800) 292-2962 Fax: (480) 303-2969

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2

354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2 Index Accounts Payable Process Review Procedures Assessments, 191 Actions to Resolve Risks COSO ERM Control Activities, 97 Activity Management COSO ERM Control Activities, 81 AICPA SAS No. 1 Internal Controls

More information

Select Agents and Toxins Security Plan Template

Select Agents and Toxins Security Plan Template Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention

More information

PA TURNPIKE COMMISSION POLICY

PA TURNPIKE COMMISSION POLICY POLICY SUBJECT: PA TURNPIKE COMMISSION POLICY This is a statement of official Pennsylvania Turnpike Policy RESPONSIBLE DEPARTMENT: NUMBER: 6.03 APPROVAL DATE: 08-25-1978 EFFECTIVE DATE: 08-25-1978 Management

More information

Chapter 10. Administration

Chapter 10. Administration Chapter 10 Administration This Page Left Blank Intentionally CTAS User Manual 10-1 Administration: Introduction The Admin section is where you enter your local government s required and optional system

More information

Identity Theft Prevention Program. Effective beginning August 1, 2009

Identity Theft Prevention Program. Effective beginning August 1, 2009 Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's

More information

Using Self Service Banking Information

Using Self Service Banking Information Using Self Service Banking Information Ellucian s Self Service, a part of WebAdvisor, provides employees and students the opportunity to add, change or delete personal banking information which allows

More information

Mathematics Shape and Space: Polygon Angles

Mathematics Shape and Space: Polygon Angles a place of mind F A C U L T Y O F E D U C A T I O N Department of Curriculum and Pedagogy Mathematics Shape and Space: Polygon Angles Science and Mathematics Education Research Group Supported by UBC Teaching

More information

SAS70 Type II Reports Use and Interpretation for SOX

SAS70 Type II Reports Use and Interpretation for SOX SAS70 Type II Reports Use and Interpretation for SOX November 19, 2007 Presented by: Erin Erickson, Senior Manager Enterprise Governance and Brenda Karl, Director Technology Risk Management Agenda Background

More information

ACCOUNTING (ACCT) Kent State University Catalog

ACCOUNTING (ACCT) Kent State University Catalog Kent State University Catalog 2018-2019 1 ACCOUNTING (ACCT) ACCT 23020 INTRODUCTION TO FINANCIAL ACCOUNTING 3 Credit (Equivalent to ACTT 11000) Introduction to the basic concepts and standards underlying

More information

2015 GoSystem Tax Line Conversion Chart. C-Corporation

2015 GoSystem Tax Line Conversion Chart. C-Corporation 2015 Line Conversion Chart C-Corporation January 2015 01A 30-100 1120 1B Gross receipts or sales 01B 30-105 1120 1D Returns and allowances 05 31-380 1120 5 Other Interest 05.01 31-380 1120 5 Tax exempt

More information

Compliance is, in general, the compliance of requirements with appropriate resources.

Compliance is, in general, the compliance of requirements with appropriate resources. is, in general, the compliance of requirements with appropriate resources. Definition / content Objectives Activities In the narrow sense: _ with external specifications KWG, WpHG, GWG, financial embargos,

More information

HIPAA For Assisted Living WALA iii

HIPAA For Assisted Living WALA iii Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...

More information

Introduction to PTC Windchill PDMLink 11.0 for the Implementation Team

Introduction to PTC Windchill PDMLink 11.0 for the Implementation Team Introduction to PTC Windchill PDMLink 11.0 for the Implementation Team Overview Course Code Course Length TRN-4752-T 16 Hours In this course, you will learn how to complete basic Windchill PDMLink functions.

More information

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9

CIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9 CIBC FirstCaribbean Mobile App FREQUENTLY ASKED QUESTIONS (FAQs) 1. What is the CIBC FirstCaribbean Mobile App? A: The CIBC FirstCaribbean Mobile App allows you to complete everyday banking functions on

More information

Duplicate Invoice Payments

Duplicate Invoice Payments Duplicate Invoice Payments David Macleod Internal Auditor Falkirk Council 4 December 2014 IDEA Scottish User Group 1 Outline of Presentation Background Risk Data Use of IDEA Findings 4 December 2014 IDEA

More information

Introduction to Windchill PDMLink 10.2 for the Implementation Team

Introduction to Windchill PDMLink 10.2 for the Implementation Team Introduction to Windchill PDMLink 10.2 for the Implementation Team Overview Course Code Course Length TRN-4262-T 2 Days In this course, you will learn how to complete basic Windchill PDMLink functions.

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

Sage Pastel Accounting. Year End Procedures Sage Pastel Partner V

Sage Pastel Accounting. Year End Procedures Sage Pastel Partner V Sage Pastel Accounting Year End Procedures Sage Pastel Partner V14 2015 Contents Welcome to your Pastel Partner Year End Guide 3 Website and online support 3 Support operating hours 3 Contacting Chips

More information

QuickBooks 2010: The Basics

QuickBooks 2010: The Basics QuickBooks 2010: The Basics Student Workbook For QuickBooks Pro and Premier ecourse By Holly Fullingim COMPUTER TRAINING CENTER 3506 S. EXPRESSWAY 77 SUITE A HARLINGEN, TEXAS 78552 (956) 428-7777 QUICKBOOKS

More information

Privacy Notice - General Data Protection Regulation ( GDPR )

Privacy Notice - General Data Protection Regulation ( GDPR ) THIS PRIVACY NOTICE APPLIES TO ANY PERSON WHO INSTRUCTS AN INDIVIDUAL BARRISTER AT 12 OLD SQUARE CHAMBERS EITHER DIRECTLY OR THROUGH A SOLICITOR OR WHO ASKS THE INDIVIDUAL BARRISTER FOR A REFERENCE Privacy

More information

Oracle Copy Inventory Organization

Oracle Copy Inventory Organization Oracle Copy Inventory Organization Implementation Guide Release 11i October 2001 Part No. A95116-01 Oracle Copy Inventory Organization Implementation Guide, Release 11i Part No. A95116-01 Copyright 1996,

More information

FINANCE ROUNDTABLE MARCH 9, 2017

FINANCE ROUNDTABLE MARCH 9, 2017 FINANCE ROUNDTABLE MARCH 9, 2017 FY 2016-2017 MANSFIELD ISD PURCHASING REMINDERS PURCHASE ORDERS Please make sure that you have a PURCHASE ORDER in place prior to purchasing ANYTHING!!! PDSA REMINDERS

More information

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial

More information

Introduction to PTC Windchill ProjectLink 11.0

Introduction to PTC Windchill ProjectLink 11.0 Introduction to PTC Windchill ProjectLink 11.0 Overview Course Code Course Length TRN-4756-T 8 Hours In this course, you will learn how to participate in and manage projects using Windchill ProjectLink

More information

MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD)

MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD) MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD) Edward Beaver Edward.Beaver@temple.edu ff Video: Record the Class Discussion v Something

More information

Section 1: Definition of Fraud / Fraud Analysis Coderre Chapters 1 6, 8, & 9

Section 1: Definition of Fraud / Fraud Analysis Coderre Chapters 1 6, 8, & 9 Page 1 of 13 Section 1: Definition of Fraud / Fraud Analysis Coderre Chapters 1 6, 8, & 9 1. True or false, is ALL theft fraud? a. True b. False 2. True or false, are ALL deceptive statements examples

More information

WEBSITE PRIVACY POLICY

WEBSITE PRIVACY POLICY WEBSITE PRIVACY POLICY INTRODUCTION Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting

More information

The date when this policy is posted to the online Company Policy Manual and communicated to all business lines: December 14, 2012

The date when this policy is posted to the online Company Policy Manual and communicated to all business lines: December 14, 2012 GENERAL POLICIES DATE: CP-134 RETENTION OF RECORDS The date when this policy is posted to the online Company Policy Manual and communicated to all business lines: December 14, 2012 SUPERSEDES POLICY DATED:

More information

Effective Date: November 26, A. Overview

Effective Date: November 26, A. Overview WEI Technology LLC ( WEI, we or us ) takes your privacy seriously. Please read this Privacy Policy, which describes the types of information we collect through www.lendingpad.com (the Website ), and how

More information

Retention and Disposal of Library Records

Retention and Disposal of Library Records MGT-5 Retention and Disposal of Library Records Policy The Warren-Trumbull County Public Library, like other public entities in the State of Ohio, must retain certain records from year to year. Although

More information