THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR
|
|
- Donna Reed
- 6 years ago
- Views:
Transcription
1 THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA
2 TABLE OF CONTENTS I. INTRODUCTION Video Supplement... 1 Course Objectives and Overview... 1 Definition of Fraud... 2 Elements of Fraud... 2 Types of Victims... 3 Fraud Statistics... 3 Profile of Fraud Offenders... 4 Video... 5 Review Questions... 6 II. FUNDAMENTALS OF FRAUD Legal Elements of Fraud... 9 Criminal Versus Civil Fraud... 9 Subclassification of Internal Fraud Schemes Misappropriation Stages Types of Concealment Detecting Fraud Tips and Complaints Weaknesses in Internal Controls Video Behavioral Changes Lifestyle Changes Video Review Questions III. FRAUD AUDITING METHODOLOGY Fraud Auditing Auditing Versus Fraud Examination Fraud Theory Analyzing Available Data Creating a Hypothesis Testing the Hypothesis Refining and Amending the Hypothesis Steps in Fraud Examination Document Examination Neutral Third-Party Witnesses Corroborative Witnesses Co-Conspirators Potential Suspect Elements of Fraud Auditing The Environment The Accounting System Various Detection Techniques Financial Statements Video i
3 III. FRAUD AUDITING METHODOLOGY (CONT.) Net-Worth Methods Review Questions IV. AUDITORS RESPONSIBILITIES Introduction Certified Fraud Examiners Responsibilities Help Resolve Allegations of Fraud Obtain Evidence Take Statements Write Reports Testify to Findings Assist in the Detection and Prevention of Fraud External Auditors Responsibilities AU Section 240 Consideration of Fraud in a Financial Statement Audit PCAOB Auditing Standard No. 5 An Audit of Internal Control over Financial Reporting That Is Integrated with an Audit of Financial Statements PCAOB Auditing Standard No. 3 Audit Documentation AU Section 230 Audit Documentation Internal Auditors Fraud-Related Responsibilities Standard 1210 Proficiency Standard 1220 Due Professional Care Standard 2060 Reporting to Senior Management and the Board Standard 2110 Governance Standard 2120 Risk Management Standard 2130 Control Standard 2210 Engagement Objectives The IIA s IPPF Practice Guide: Internal Auditing and Fraud Review Questions V. CASH SCHEMES Introduction Skimming Voids and Under-Rings Swapping Checks for Cash Alteration of Cash Receipts Documentation Fictitious Refunds and Discounts Journal Entries Kiting Video Cash Fraud Detection Methods Bank Reconciliations Cut-Off Statements Surprise Cash Counts Customer Complaints Altered or Missing Documents Fictitious Refunds or Discounts ii
4 V. CASH SCHEMES (CONT.) Journal Entry Review Review and Analysis of Gross Sales and Returns and Allowances Analytical Review Deposit Dates Cash Advances Voids and Refunds by Employee Identification Cash Fraud Prevention Methods Segregation of Duties Assignment Rotation and Mandatory Vacations Surprise Cash Counts Review Questions VI. ACCOUNTS RECEIVABLE SCHEMES Introduction Lapping Fictitious Accounts Receivable Old or Written-Off Accounts Receivable Borrowing Against Accounts Receivable Video Accounts Receivable Fraud Detection Matching Deposit Dates Confirmations Accounting Cut-Off Analysis Trend Analysis on Written-Off Accounts Receivable Tracking System Accounts Receivable Fraud Prevention Segregation of Duties Lock-Box Arrangements Objective, Sales-Based Compensation Plans Review Questions VII. INVENTORY SCHEMES Introduction Theft of Inventory Larceny Video Appropriating Inventory for Personal Use (Theft) Theft of Scrap Proceeds Charging Embezzlements to Inventory Video Inventory Fraud Detection Statistical Sampling Physical Inventory Counts Analytical Review Computer-Generated Trend Analysis Inventory Fraud Prevention Proper Documentation iii
5 VII. INVENTORY SCHEMES (CONT.) Segregation of Duties Video Independent Checks Physical Safeguards Review Questions VIII. PURCHASING SCHEMES Introduction Fictitious Invoices Overbilling Schemes Checks Payable to Employees Conflicts of Interest Detecting Purchasing Schemes Analytical Review Statistical Sampling Vendor or Outside Complaints Site Visits and Observation Preventing Purchasing Schemes Education Compensation Other Measures Review Questions IX. INVESTMENT AND FIXED ASSET SCHEMES Introduction Investments Detecting Investment and Fixed-Asset Schemes Investments Fixed Assets Preventing Investment and Fixed Asset Schemes Custody of the Assets Approval to Sell or Dispose of Assets Control Over Physical Disposition of Assets Receipt of Sale Proceeds Periodic Physical Inspections Review Questions X. PAYROLL AND PERSONAL EXPENSE SCHEMES Introduction Payroll Fraud Ghost Employees Falsified Hours and Salary Schemes Commission Schemes Video Video Detecting Payroll Schemes Independent Payroll Distribution iv
6 X. PAYROLL AND PERSONAL EXPENSE SCHEMES (CONT.) Analysis of Payee Address or Accounts Screening for Duplicate Social Security Numbers Overtime Authorizations Detecting Commission Schemes Analysis of Deductions from Payroll Checks Preventing Payroll Schemes Segregation of Duties Video Periodic Review and Analysis of Payroll Personal Expense Reimbursement Detecting Personal Expense Schemes Review and Analysis of Expense Accounts Detail Review of Expense Reimbursements Preventing Personal Expense Schemes Strong Ethics Policy Detailed Expense Reports: Submission and Review Video Review Questions XI. BRIBERY AND CORRUPTION SCHEMES Introduction Bribery Illegal Gratuity Collusion Conflict of Interest Bribery and Corruption Schemes Kickbacks Gifts and Gratuities Methods of Making Illegal Payments Video Detection of Bribery and Corruption Schemes The Corrupt Recipient The Corrupt Payer Review Questions XII. THEORY OF FRAUD PREVENTION Introduction The Cressey Study Pressure Opportunity Rationalization Minimizing Pressures Have an Open-Door Policy Management s Attitudes Employee Support Programs Minimizing Opportunities Management Oversight v
7 XII. THEORY OF FRAUD PREVENTION (CONT.) Job Rotation Proactive Audit Policy Well-Defined and Understood Fraud Reporting Program Minimizing Rationalizations An Educational Program Written Ethics Policy Dishonest Acts Will Be Punished Video Create a Low-Fraud Environment Review Questions XIII. FRAUD ASSESSMENT QUESTIONING TECHNIQUES Introduction Questions and Responses Review Questions XIV. PRACTICAL PROBLEMS Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem XV. APPENDIX A: SAMPLE FRAUD POLICY XVI. APPENDIX B: FRAUD RISK CHECKLIST XVII. APPENDIX C: VIDEO TRANSCRIPTS XVIII. SOLUTIONS TO REVIEW QUESTIONS I. Introduction II. Fundamentals of Fraud III. Fraud Auditing Methodology IV. Auditors Responsibilities V. Cash Schemes VI. Accounts Receivable Schemes VII. Inventory Schemes VIII. Purchasing Schemes IX. Investment and Fixed Asset Schemes X. Payroll and Personal Expense Schemes XI. Bribery and Corruption Schemes XII. Theory of Fraud Prevention XIII. Fraud Assessment Questioning Techniques vi
8 XVII. SOLUTIONS TO PRACTICAL PROBLEMS Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem Practical Problem XX. FINAL EXAMINATION... E-1 XXI. INDEX... I-1 vii
716 West Ave Austin, TX USA
: THE BASICS OF ASSET MISAPPROPRIATION GLOBAL HEADQUARTERS the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 1 Introduction
More informationOTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION
: THE BASICS OF ASSET MISAPPROPRIATION World Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 3 Introduction
More informationOTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION (NO )
: THE BASICS OF ASSET MISAPPROPRIATION (NO. 99-5402) TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 3 Asset Misappropriations... 5 ACFE s Occupational Fraud and Abuse Survey...
More informationFRAUD-RELATED INTERNAL CONTROLS
GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS I. THE NEED FOR INTERNAL CONTROLS Example... 1 Threats to an Organization s Internal Control Environment...
More informationSmall Business FRAUD PREVENTION Manual
Small Business FRAUD PREVENTION Manual TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud
More informationTHE SMALL BUSINESS FRAUD PREVENTION MANUAL
THE SMALL BUSINESS FRAUD PREVENTION MANUAL TABLE OF CONTENTS PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud to Small
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationPEM Contents Checklist
Contents Checklist PEM Contents Checklist Below is a detailed listing of the entire contents for Update #41 dated September 2008. This is provided to allow subscribers to ensure that their binder(s) are
More informationsecurity FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.
security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name. Security for Your Business Mitigating risk is a daily reality for business owners, but you don t have
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationA Framework for Managing Crime and Fraud
A Framework for Managing Crime and Fraud ASIS International Asia Pacific Security Forum & Exhibition Macau, December 4, 2013 Torsten Wolf, CPP Head of Group Security Operations Agenda Introduction Economic
More information2 New Company Setup OBJECTIVES:
2 New Company Setup In Chapter 2 of Accounting Fundamentals with QuickBooks Online Essentials Edition, you will learn how to use the software to set up your business. New Company Setup includes selecting
More information"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary
Course Summary Description In this course, you will perform evaluations of organizational policies, procedures, and processes to ensure that an organization's information systems align with overall business
More informationSANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018
SANMINA CORPORATION PRIVACY POLICY Effective date: May 25, 2018 This Privacy Policy (the Policy ) sets forth the privacy principles that Sanmina Corporation and its subsidiaries (collectively, Sanmina
More informationRISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS
CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7
More informationList of Modules with its Forms and Reports (IFW Campus ERP - EduTech)
List of Modules with its Forms and Reports (IFW Campus ERP - EduTech) 1. MASTER MODULE i. CODE MASTER ii. DEPARTMENT MASTER iii. ROOM MASTER iv. COURSE MASTER v. COMPANY MASTER vi. COLLEGE MASTER vii.
More informationDefinition of Internal Control
Definition of Internal Control - To address and limit potential risks - designed, implemented and maintained by those charged with governance to provide reasonable assurance about the achievement of the
More informationRunning QuickBooks 2008 Premier Editions
Running QuickBooks 2008 Premier Editions Kathy Ivens CPA911 Publishing, LLC Philadelphia PA Running QuickBooks 2008 Premier Editions ISBN Number 10-digit: 1-932925-03-1 13-digit: 978-1-932925-03-6 Published
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More informationCruiseSmarter PRIVACY POLICY. I. Acceptance of Terms
I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",
More informationFraud awareness & Information pack for ANZ Customers
Fraud awareness & Information pack for ANZ Customers 2 INTRODUCTION IS FRAUD THE SILENT PARTNER IN YOUR BUSINESS? If fraud was a country it would rate as the fifth largest economy in the world - according
More informationExposure Draft The Auditor s Responsibility to Consider Fraud in an Audit of Financial Statements
Chartered Accountants of Canada Comptables agréés du Canada The Canadian Institute of Chartered Accountants 277 Wellington Street West Toronto, Ontario Canada M5V 3H2 Tel: (416) 977-3222 Fax: (416) 977-8585
More informationCASH MANAGEMENT TRAINING FY2018
CASH MANAGEMENT TRAINING FY2018 Katie Mahoney katherine.mahoney@maine.edu 780-4484 The Office of Finance & Administration University of Southern Maine University of Maine System - 1 - Cash Collection The
More informationRisk Management in Electronic Banking: Concepts and Best Practices
Risk Management in Electronic Banking: Concepts and Best Practices Jayaram Kondabagil BICENTENNIAL B1CBNTENNIAL John Wiley & Sons (Asia) Pte Ltd. Contents List of Figures xiii List of Tables xv Preface
More informationQ3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below.
Q1. What is DuitNow? DuitNow is a new real-time online fund transfer service that allows consumers and business owners to transfer money using an ID called DuitNow ID instead of having to exchange bank
More informationINDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION
IMS Securities, Inc. Member FINRA/SIPC IMS Financial Advisors, Inc. INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION The Firm and you are subject to a multitude of laws and regulations governing
More informationAudit Considerations Relating to an Entity Using a Service Organization
An Entity Using a Service Organization 355 AU-C Section 402 Audit Considerations Relating to an Entity Using a Service Organization Source: SAS No. 122; SAS No. 128; SAS No. 130. Effective for audits of
More informationContents CHAPTER 1 CHAPTER 2. Recommended Reading. Chapter-heads. Electronic Funds Transfer) Contents PAGE
Contents Foreword Recommended Reading Syllabus Chapter-heads iii v vii ix MODULE I : Technology in bank CHAPTER 1 Banking Environment and Technology u Introduction 3 u Evolution of Banking Technology over
More informationCITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.
CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)
More informationINTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS
INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after December 15, 2009) CONTENTS Paragraph Introduction Scope of
More informationCharitable Registration User Guide
Charitable Registration User Guide Table of Contents Chapter 1 Online Charitable Registration... 3 A. Creating an Account... 3 I. Employer Identification Number (EIN)... 3 II. Step 2: Create Account...
More informationPrevention of Identity Theft in Student Financial Transactions AP 5800
Reference: Fair and Accurate Credit Transactions Act (Pub. L. 108-159) The Board recognizes that some activities of the Shasta-Tehama-Trinity Joint Community College District, "District," are subject to
More informationQuickBooks Basics Level III
Page1 QuickBooks Basics Level III Part VII Handling the Money Payments and deposits Recording Customer Payments If a payment is received at the time of the sale, QuickBooks automatically records the customer
More informationCITADEL INFORMATION GROUP, INC.
CITADEL INFORMATION GROUP, INC. The Role of the Information Security Assessment in a SAS 99 Audit Stan Stahl, Ph.D. President Citadel Information Group, Inc. The auditor has a responsibility to plan and
More informationGovernment-issued identification numbers (e.g., tax identification numbers)
Privacy Policy This Privacy Policy explains how the ACMI collects, uses, shares and safeguards Personal Data and Non- Personal Data on www.acmiart.org, mobile websites, microsites, mobile applications,
More informationEXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS
SRI LANKA STANDARD 505 EXTERNAL CONFIRMATIONS (Effective for audits of financial statements for periods beginning on or after 01 January 2014) CONTENTS Paragraph Introduction Scope of this SLAuS... 1 External
More informationGRC SURVEY RESULT Please indicate your profession
COPENHAGEN?=! CO?=! MPLIANCE T o p i c a l a n d T i m e l y Riskability GRC Controllers Governance, Risk & Compliance COPENHAGEN?=! CHARTER Bribery, Fraud & Corruption GRC SURVEY RESULT. Please indicate
More informationUSER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.
These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy. I. OBJECTIVE ebay s goal is to apply uniform, adequate and global data protection
More informationInternational Standard on Auditing (Ireland) 505 External Confirmations
International Standard on Auditing (Ireland) 505 External Confirmations MISSION To contribute to Ireland having a strong regulatory environment in which to do business by supervising and promoting high
More informationAGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS
EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products
More informationHow technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011
How technology changed fraud investigations Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011 The Changing Cyberfraud Landscape Underground Economy Malware Authors Organized
More informationLIST OF SUBSTANTIVE CHANGES AND ADDITIONS. PPC's Guide to Audits of Local Governments. Thirty first Edition (February 2016)
Route To: Partners Managers Staff File LIST OF SUBSTANTIVE CHANGES AND ADDITIONS PPC's Guide to Audits of Local Governments Thirty first Edition (February 2016) Highlights of This Edition The following
More informationCITY UNIVERSITY OF NEW YORK. i. Visit:
CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the
More informationPrivacy Notice. General Information Protection Regulation ( GDPR )
Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise
More informationDIPLOMA COURSE IN INTERNAL AUDIT
DIPLOMA COURSE IN INTERNAL AUDIT Course Objective: Internal Audit is an assurance and consulting service that reviews the efficiency and effectiveness of the internal control.. It assists management at
More informationLearning Objectives. External confirmations procedures as per SA330 and SA 500 requirements
CA. Sudhir Sharma 1 Learning Objectives 1 2 3 4 External confirmations procedures as per SA330 and SA 500 requirements Management s refusal to allow auditor to send confirmation requests Results of the
More informationSTATE OF MINNESOTA PROFESSIONAL FUNDRAISER SOLICITATION NOTICE INSTRUCTIONS
Mail To: Minnesota Attorney General s Office Charities Division 445 Minnesota Street, Suite 1200 St. Paul, MN 55101-2130 Website Address: www.ag.state.mn.us/charity STATE OF MINNESOTA PROFESSIONAL FUNDRAISER
More informationAnnexure I: Contact Details:
Ref: CO/IT-BPR/CSC Date:.09.2017 Annexure I: Contact Details: a) Name of the company b) Company s address in India c) Contact person d) Telephone no. e) Fax f) E-mail address g) Service tax registration
More informationFulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions
Public Sector Best Practices that Protect the Citizens against Financial Losses, Waste and Fraud Using Advanced Controls FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation
More informationLearning with the IIA Refreshing the profession: The New Internal Auditor. Jan Olivier 6 February 2019
Learning with the IIA Refreshing the profession: The New Internal Auditor Jan Olivier 6 February 2019 Contents title Qualifications framework CIA syllabus update Learning support Qualifications framework
More informationAuditing and assurance
Auditing and assurance Higher School of Economics, ICEF Lecturer: Anna Pirozhkova Seminars: Tatiana Shurchkova Contacts +7 (916) 468 33 99 (Anna), ann.pirozhkova@gmail.com Target audience 4th Year students.
More informationOnline Trade License System User Manual
GUWAHATI MUNICIPAL CORPORATION Online Trade License System User Manual 7/5/2017 Version no. 1.0 TABLE OF CONTENTS INTRODUCTION... 2 USER MANUAL - CITIZEN... 3 USER MANUAL - OPERATOR... 16 USER MANUAL DEALING
More informationBank Reconciliation Release 2015
Bank Reconciliation Release 2015 Disclaimer This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
More informationChapter 08. Consideration of Internal Control in an Information Technology Environment. McGraw-Hill/Irwin
Chapter 08 Consideration of Internal Control in an Information Technology Environment McGraw-Hill/Irwin Copyright 2012 by The McGraw-Hill Companies, Inc. All rights reserved. Nature of IT Based Systems
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationCertified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) 1. Domain 1 The Process of Auditing Information Systems Provide audit services in accordance with IT audit standards to assist the organization in protecting
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationTesting Period. Basics of the Enrolled Agent Exam TAX PREPARER LEARNING SYSTEMS, LLC
2018-19 Testing Period Basics of the Enrolled Agent Exam TAX PREPARER LEARNING SYSTEMS, LLC Introduction and General Information What is an Enrolled Agent? An enrolled agent is a person who has earned
More informationTOURISM REGULATORY AUTHORITY VACANCIES
TOURISM REGULATORY AUTHORITY VACANCIES Tourism Regulatory Authority (TRA) is a state corporation established under Tourism Act No. 28 of 2011 to regulate, manage and provide strategic direction to the
More informationInternational Standard on Auditing (UK) 505
Standard Audit and Assurance Financial Reporting Council July 2017 International Standard on Auditing (UK) 505 External Confi rmations The FRC s mission is to promote transparency and integrity in business.
More informationOF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011
INTERNATIONAL FEDERATION OF ACCOUNTANTS IAASB CAG MEETING MARCH 7, 2011 HISTORY OF THE IIA 1941 Founded in New York City 1944 First chapter outside the US chartered in Toronto 1948 First chapters outside
More informationBuilding a Privacy Management Program
Building a Privacy Management Program February 26, 2013 Office of the Information and Privacy Commissioner of Alberta Session Overview Reasons for having a PMP Strategies to deal with current and future
More informationThe CIA Challenge Exam. August 2018
The CIA Challenge Exam August 2018 The IIA is committed to providing a clearly defined, professionally relevant suite of global certifications to support internal auditors as they progress through their
More informationUNIVERSITI SAINS MALAYSIA. CIT502 Object-Oriented Programming and Software Engineering
UNIVERSITI SAINS MALAYSIA First Semester Examination Academic Session 2003/2004 September/October 2003 CIT502 Object-Oriented Programming and Software Engineering Duration : 3 hours INSTRUCTION TO CANDIDATE:
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationOracle Financials RXi Reports Administration Tool
Oracle Financials RXi Reports Administration Tool User Guide Release 11i May, 2000 Part No. A81232-02 Oracle Financials RXi Reports Administration Tool User Guide, Release 11i Part No. A81232-02 Copyright
More informationCONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA
GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA TABLE OF CONTENTS COURSE INTRODUCTION Course Objective... xi Course Overview... xi Learning Objectives...xii I. CONSUMER FRAUD
More informationCYMA IV. Accounting for Windows. CYMA IV Getting Started Guide. Training Guide Series
CYMA IV Accounting for Windows Training Guide Series CYMA IV Getting Started Guide November 2010 CYMA Systems, Inc. 2330 West University Drive, Suite 4 Tempe, AZ 85281 (800) 292-2962 Fax: (480) 303-2969
More informationRed Flags Program. Purpose
Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University
More information354 & Index Board of Directors Responsibilities Audit Committee and Risk Committee Coordination, 244 Audit Committee Functions and Responsibilities, 2
Index Accounts Payable Process Review Procedures Assessments, 191 Actions to Resolve Risks COSO ERM Control Activities, 97 Activity Management COSO ERM Control Activities, 81 AICPA SAS No. 1 Internal Controls
More informationSelect Agents and Toxins Security Plan Template
Select Agents and Toxins Security Plan Template 7 CFR Part 331.11, 9 CFR Part 121.11, 42 CFR Part 73.11 Prepared by U.S. Department of Health and Human Services (HHS) Centers for Disease Control and Prevention
More informationPA TURNPIKE COMMISSION POLICY
POLICY SUBJECT: PA TURNPIKE COMMISSION POLICY This is a statement of official Pennsylvania Turnpike Policy RESPONSIBLE DEPARTMENT: NUMBER: 6.03 APPROVAL DATE: 08-25-1978 EFFECTIVE DATE: 08-25-1978 Management
More informationChapter 10. Administration
Chapter 10 Administration This Page Left Blank Intentionally CTAS User Manual 10-1 Administration: Introduction The Admin section is where you enter your local government s required and optional system
More informationIdentity Theft Prevention Program. Effective beginning August 1, 2009
Identity Theft Prevention Program Effective beginning August 1, 2009 I. PROGRAM ADOPTION Christian Brothers University developed this Identity Theft Prevention Program pursuant to the Federal Trade Commission's
More informationUsing Self Service Banking Information
Using Self Service Banking Information Ellucian s Self Service, a part of WebAdvisor, provides employees and students the opportunity to add, change or delete personal banking information which allows
More informationMathematics Shape and Space: Polygon Angles
a place of mind F A C U L T Y O F E D U C A T I O N Department of Curriculum and Pedagogy Mathematics Shape and Space: Polygon Angles Science and Mathematics Education Research Group Supported by UBC Teaching
More informationSAS70 Type II Reports Use and Interpretation for SOX
SAS70 Type II Reports Use and Interpretation for SOX November 19, 2007 Presented by: Erin Erickson, Senior Manager Enterprise Governance and Brenda Karl, Director Technology Risk Management Agenda Background
More informationACCOUNTING (ACCT) Kent State University Catalog
Kent State University Catalog 2018-2019 1 ACCOUNTING (ACCT) ACCT 23020 INTRODUCTION TO FINANCIAL ACCOUNTING 3 Credit (Equivalent to ACTT 11000) Introduction to the basic concepts and standards underlying
More information2015 GoSystem Tax Line Conversion Chart. C-Corporation
2015 Line Conversion Chart C-Corporation January 2015 01A 30-100 1120 1B Gross receipts or sales 01B 30-105 1120 1D Returns and allowances 05 31-380 1120 5 Other Interest 05.01 31-380 1120 5 Tax exempt
More informationCompliance is, in general, the compliance of requirements with appropriate resources.
is, in general, the compliance of requirements with appropriate resources. Definition / content Objectives Activities In the narrow sense: _ with external specifications KWG, WpHG, GWG, financial embargos,
More informationHIPAA For Assisted Living WALA iii
Table of Contents The Wisconsin Assisted Living Association... ix Mission... ix Vision... ix Values... ix Acknowledgments... ix Who Should Use This Manual... x How to Use This Manual... x Updates and Forms...
More informationIntroduction to PTC Windchill PDMLink 11.0 for the Implementation Team
Introduction to PTC Windchill PDMLink 11.0 for the Implementation Team Overview Course Code Course Length TRN-4752-T 16 Hours In this course, you will learn how to complete basic Windchill PDMLink functions.
More informationCIBC FirstCaribbean Mobile App. FREQUENTLY ASKED QUESTIONS (FAQs) Page 1 of 9
CIBC FirstCaribbean Mobile App FREQUENTLY ASKED QUESTIONS (FAQs) 1. What is the CIBC FirstCaribbean Mobile App? A: The CIBC FirstCaribbean Mobile App allows you to complete everyday banking functions on
More informationDuplicate Invoice Payments
Duplicate Invoice Payments David Macleod Internal Auditor Falkirk Council 4 December 2014 IDEA Scottish User Group 1 Outline of Presentation Background Risk Data Use of IDEA Findings 4 December 2014 IDEA
More informationIntroduction to Windchill PDMLink 10.2 for the Implementation Team
Introduction to Windchill PDMLink 10.2 for the Implementation Team Overview Course Code Course Length TRN-4262-T 2 Days In this course, you will learn how to complete basic Windchill PDMLink functions.
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationSage Pastel Accounting. Year End Procedures Sage Pastel Partner V
Sage Pastel Accounting Year End Procedures Sage Pastel Partner V14 2015 Contents Welcome to your Pastel Partner Year End Guide 3 Website and online support 3 Support operating hours 3 Contacting Chips
More informationQuickBooks 2010: The Basics
QuickBooks 2010: The Basics Student Workbook For QuickBooks Pro and Premier ecourse By Holly Fullingim COMPUTER TRAINING CENTER 3506 S. EXPRESSWAY 77 SUITE A HARLINGEN, TEXAS 78552 (956) 428-7777 QUICKBOOKS
More informationPrivacy Notice - General Data Protection Regulation ( GDPR )
THIS PRIVACY NOTICE APPLIES TO ANY PERSON WHO INSTRUCTS AN INDIVIDUAL BARRISTER AT 12 OLD SQUARE CHAMBERS EITHER DIRECTLY OR THROUGH A SOLICITOR OR WHO ASKS THE INDIVIDUAL BARRISTER FOR A REFERENCE Privacy
More informationOracle Copy Inventory Organization
Oracle Copy Inventory Organization Implementation Guide Release 11i October 2001 Part No. A95116-01 Oracle Copy Inventory Organization Implementation Guide, Release 11i Part No. A95116-01 Copyright 1996,
More informationFINANCE ROUNDTABLE MARCH 9, 2017
FINANCE ROUNDTABLE MARCH 9, 2017 FY 2016-2017 MANSFIELD ISD PURCHASING REMINDERS PURCHASE ORDERS Please make sure that you have a PURCHASE ORDER in place prior to purchasing ANYTHING!!! PDSA REMINDERS
More informationIs your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner
Is your privacy secure? HIPAA Compliance Workshop September 2008 Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner Agenda Have you secured your key operational, competitive and financial
More informationIntroduction to PTC Windchill ProjectLink 11.0
Introduction to PTC Windchill ProjectLink 11.0 Overview Course Code Course Length TRN-4756-T 8 Hours In this course, you will learn how to participate in and manage projects using Windchill ProjectLink
More informationMIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD)
MIS 5121: Business Process, ERP Systems & Controls Week 9: Security: User Management, Segregation of Duties (SOD) Edward Beaver Edward.Beaver@temple.edu ff Video: Record the Class Discussion v Something
More informationSection 1: Definition of Fraud / Fraud Analysis Coderre Chapters 1 6, 8, & 9
Page 1 of 13 Section 1: Definition of Fraud / Fraud Analysis Coderre Chapters 1 6, 8, & 9 1. True or false, is ALL theft fraud? a. True b. False 2. True or false, are ALL deceptive statements examples
More informationWEBSITE PRIVACY POLICY
WEBSITE PRIVACY POLICY INTRODUCTION Welcome to the Octopus Group s privacy policy ( Privacy Policy ) Octopus Group respects your privacy and is committed doing the right thing when it comes to protecting
More informationThe date when this policy is posted to the online Company Policy Manual and communicated to all business lines: December 14, 2012
GENERAL POLICIES DATE: CP-134 RETENTION OF RECORDS The date when this policy is posted to the online Company Policy Manual and communicated to all business lines: December 14, 2012 SUPERSEDES POLICY DATED:
More informationEffective Date: November 26, A. Overview
WEI Technology LLC ( WEI, we or us ) takes your privacy seriously. Please read this Privacy Policy, which describes the types of information we collect through www.lendingpad.com (the Website ), and how
More informationRetention and Disposal of Library Records
MGT-5 Retention and Disposal of Library Records Policy The Warren-Trumbull County Public Library, like other public entities in the State of Ohio, must retain certain records from year to year. Although
More information