OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION (NO )

Similar documents
OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION

716 West Ave Austin, TX USA

Small Business FRAUD PREVENTION Manual

THE SMALL BUSINESS FRAUD PREVENTION MANUAL

THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR

FRAUD-RELATED INTERNAL CONTROLS

Nexsure Training Manual - Accounting. Chapter 7

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

Municipal Software Inc. Vendor ACH Payments. Assembly, No (Quijano D-20/O Scanlon R-13)(Weinberg D- 38/Oroho R-24)

Client-Account Receivable

Chapter 2 Introduction to Transaction Processing

2 New Company Setup OBJECTIVES:

QuickBooks Basics Level III

9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR

Creating a Reimbursement Request

Envision Credit Card Processing

Red Flags/Identity Theft Prevention Policy: Purpose

Fraud awareness & Information pack for ANZ Customers

Journal Entries Overview

Financials Module: General Ledger

Running QuickBooks 2008 Premier Editions

716 West Ave Austin, TX USA

CASH MANAGEMENT TRAINING FY2018

Prevention of Identity Theft in Student Financial Transactions AP 5800

QuickBooks Pro 2001 and QuickBooks 2001

4. The portion of the monthly bill from a credit card company is an example of a turn-around document.

PCLaw Version 13.0 Quick Start Guide

BUSINESS SYSTEM PLUS (MODULAR)

ShelbyNext Financials Portal

Our mission is you. Your New Account B A N K w w w. d a v i s o n s t a t e b a n k. c o m. switch

1. Access the Journal Entry Form via University Forms and Documents.

Microsoft Dynamics GP. RapidStart Services

Preventing fraud in public sector entities

The. CB Certified. Bookkeeper. Designation. Preparing Your CE Students for the National Certification Examination

Guide to credit card security

Quick Books Online Training

Chapter 2 Introduction to Transaction Processing

Studio Designer Basic

User's Guide. Alpha Five Accounting. Accounting Made Easy. Version 3.0. Copyright BetaSoft LLC - All Rights Reserved

RECEIVING Fast 9.1 Purchasing Services. Purchasing Services RECEIVING TABLE OF CONTENTS. OVERVIEW Page 2. CREATE A RECEIPT Page 3

IMPORTING QUICKBOOKS DATA. Use this guide to help you convert from QuickBooks to Denali

CYMA IV. Accounting for Windows. CYMA IV Getting Started Guide. Training Guide Series

I S B N

Table of Contents General Information Table Maintenance Top Ten Reports

Financial Reference Guide Front Door Forum

( Utility Name ) Identity Theft Prevention Program

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

CHAPTER 3: DAILY PROCEDURES

INTERNATIONAL STANDARD ON AUDITING 505 EXTERNAL CONFIRMATIONS CONTENTS

If you want to specify the account code itself, there are several ways to enter the code:

FINANCE ROUNDTABLE MARCH 9, 2017

Disbursement Voucher (DV) Quick Reference Guide

Quickbooks Interface Guide

Identity Theft Prevention Program. Effective beginning August 1, 2009

International Standard on Auditing (Ireland) 505 External Confirmations

FINANCE MANAGER. Accounting Manual Finance Manager.

Red Flag Policy and Identity Theft Prevention Program

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

Concur Travel & Expense EXPENSE REPORT

Business Bill Pay User s Guide

EXTERNAL CONFIRMATIONS SRI LANKA AUDITING STANDARD 505 EXTERNAL CONFIRMATIONS

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

CALCASIEU PARISH SCHOOL BOARD SCHOOL ACTIVITY FUNDS EPES ACCOUNTING PROCEDURES MANUAL

QuickBooks 2010: The Basics

These instructions allow you to create a payment or credit memo for a Vendor (payee) with one invoice or credit memo, using Document Level Accounting.

New Features in Sage BusinessVision 2019 ( )

How to Receive on a Purchase Order

PA TURNPIKE COMMISSION POLICY

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Using Self Service Banking Information

QUICKBOOKS TRANSACTIONS

ACCOUNTING I Chapter 3 (10ed) Reading Guide. 1. What is a form for recording transactions in chronological order called?

Recognizing & Protecting Against Fraud

University of North Carolina User Guide

Table of Contents. Chapter 1: Installation Hardware Requirements... 1 Special Setup for Windows Vista... 1

University of Wyoming Mobile Communication Device Policy Effective January 1, 2013

Business Bill Pay User Guide

Table of Contents. TRAVEL POLICIES AND PROCEDURES... 4 Registration Fees:... 4 Airfare:... 4 Hotel Reservations... 4 Meals and Incidentals...

GBLS CHECK REQUEST PROCEDURES:

JHA Payment Solutions. MASTER Site Funds Verification jxchange. Client Training Guide. ipay Solutions December 2016

GETTING STARTED ONLINE

CYBER SECURITY RESOURCE GUIDE. Cyber Fraud Overview. Best Practices and Resources. Quick Reference Guide for Employees. Cyber Security Checklist

Opera 3 Cashbook Training Manual

CARD PROGRAM REIMBURSEMENT REQUEST. To create a reimbursement request in works.please follow steps 1-8

Security and Log-On Settings

PEM Contents Checklist

Automatic Time and Expense System (ATS) Procedure

Student Activities Purchase Orders (Internal Accounts) Munis > Financials > Student Activity > Activity Transactions

[Utility Name] Identity Theft Prevention Program

HCSS Accounting Release Notes Central Functionality V1.7

Food & Beverage Timekeeping 101: A Guide to Effective Scheduling and Improved Accuracy

JHA Payment Solutions ipay Solutions. Business Bill Pay. Funds Verification CSL Client Reference Guide. September 2018

Page 1 of 6 Bank card and cheque fraud

Banking. November 22,

RELEASE NOTES: FEBRUARY 23, 2016

Greater TEXAS Federal Credit Union 6411 North Lamar Blvd. Austin, TX (512) Toll Free: (800) Fax: (512)

2015 GoSystem Tax Line Conversion Chart. C-Corporation

Michigan Tech University Banner Finance Self-Service User Guide. Revised 1/11/17

Nextgen. Bank Reconciliation Menu. NG FM - Bank Reconciliation 3/29/2016. Resource Financial Management. Bank Reconciliation

Welcome to our online Web Help for the Activity Fund Accounting System software.

Transcription:

: THE BASICS OF ASSET MISAPPROPRIATION (NO. 99-5402)

TABLE OF CONTENTS I. INTRODUCTION The Pervasive Threat of Employee Theft... 3 Asset Misappropriations... 5 ACFE s Occupational Fraud and Abuse Survey... 5 Measuring the Cost of Occupational Fraud... 5 Losses Reported in the 2010 International Fraud Survey... 6 How Occupational Fraud Is Committed... 7 Duration of Fraud Schemes... 13 Detection of Fraud Schemes... 14 Victims of Occupational Fraud... 15 The Perpetrators... 22 A Need for Better Efforts to Fight Fraud... 36 About this Workbook... 36 Review Questions... 38 II. CASH THEFT SCHEMES Overview... 39 Skimming... 41 Sales Skimming... 41 Skimming Receivables... 53 Skimming Revenues vs. Larceny of Revenues... 60 Unconcealed Larceny of Revenues... 60 Understated Sales... 66 Cash Larceny from the Deposit... 69 Converting Stolen Checks... 75 Preventing and Detecting Cash Theft... 77 Separation of Duties in the Receipt of Cash... 77 Red Flags Cash Theft Schemes... 79 General Control Objectives... 80 Maintaining Physical Security of Cash... 82 Analytical Review... 83 Shrinkage... 84 Detecting Lapping of Sales or Receivables... 84 Assignment Rotation and Mandatory Vacations... 84 Surprise Cash Counts and Procedure Supervision... 85 Receipt or Sales Level Detection... 85 Check Conversion Detection... 85 Review Questions... 86 III. BILLING SCHEMES Overview... 91 Shell Company Schemes... 91 What is a Shell Company?... 91 Shell Company Bank Accounts... 94 i

III. BILLING SCHEMES (CONT.) How Payments are Collected... 96 Billing on Behalf of the Shell Company... 97 Pass-Through Schemes... 103 Overbilling Schemes Involving Existing Vendors... 104 Kickback Schemes... 104 Pay-and-Return Schemes... 109 False Invoicing from Non-Accomplice Vendors... 111 Personal Purchases with Company Funds... 112 Personal Purchases through False Invoicing... 112 Personal Purchases on Credit Cards or Other Company Accounts... 117 Charge Accounts... 119 Returning Merchandise for Cash... 120 Preventing and Detecting Billing Schemes... 120 Separation of Duties in the Purchasing Process... 120 Red Flags Billing Schemes... 122 Control Objectives Billing Schemes... 124 Deterring Billing Schemes... 125 Review Questions... 127 IV. PAYROLL SCHEMES Overview... 131 Ghost Employees... 131 Placing the Ghost on the Payroll... 131 Collecting Timekeeping Information... 134 Issuing the Ghost s Paycheck... 135 Delivery of the Paycheck... 135 Suggestions for Preventing and Detecting Ghost Employee Schemes... 137 Falsified Hours and Salary... 138 Manually Prepared Timecards... 139 Understating Leave and Vacation... 143 Time Clocks and Other Automated Timekeeping Systems... 144 Rates of Pay... 144 Suggestions for Preventing and Detecting Falsified Hours and Salary Schemes... 145 Commission Schemes... 146 Fictitious Sales... 146 Altered Sales... 147 Altering the Rate of Commission... 147 Suggestions for Preventing and Detecting Commission Schemes... 147 Prevention and Detection of Payroll Schemes... 149 Separation of Duties in the Payroll Process... 149 Red Flags Payroll Schemes... 151 Independent Payroll Distribution... 152 Analysis of Payee Address or Accounts... 152 Overtime Authorization... 152 Commissions... 152 Analysis of Deductions from Payroll Checks... 152 Prevention of Payroll Schemes... 153 ii

IV. PAYROLL SCHEMES (CONT.) Review Questions... 155 V. EXPENSE REIMBURSEMENT SCHEMES Overview... 158 Mischaracterized Expense Reimbursements... 158 Suggestions for Preventing and Detecting Mischaracterized Expense Schemes... 161 Overstated Expense Reimbursements... 162 Altered Support... 162 Overpurchasing... 162 Overstating Another Employee s Expenses... 163 Orders to Overstate Expenses... 165 Suggestions for Preventing and Detecting Overstated Expense Reimbursements... 165 Fictitious Expense Reimbursements... 166 Producing Fictitious Receipts... 166 Obtaining Blank Receipts from Vendors... 168 Claiming Expenses Paid by Others... 168 Suggestions for Preventing and Detecting Fictitious Expense Reimbursements Schemes... 168 Multiple Reimbursements... 169 Suggestions for Preventing and Detecting Multiple Reimbursement Schemes... 170 Prevention and Detection of Expense Reimbursement Schemes... 170 Reviewing Expense Reimbursement Requests... 170 Review and Analysis of Expense Accounts... 171 Red Flags Expense Reimbursement Schemes... 172 Review Questions... 253 VI. CHECK TAMPERING SCHEMES Overview... 177 Forged Maker Schemes... 177 Obtaining Blank Checks... 179 Producing Counterfeit Checks... 180 Suggestions for Detecting and Preventing the Theft of an Organization s Check Stock... 181 To Whom is the Check Made Payable?... 181 Forging the Signature... 183 Forged Endorsement Schemes... 186 Intercepting Checks Before Delivery... 188 Theft of Returned Checks... 189 Poor Control of Signed Checks... 189 Altered Payee Schemes... 191 Altering Checks Prepared by Others: Inserting a New Payee... 192 Altering Checks Prepared by Others: Tacking On... 194 Altering Checks Prepared by the Fraudster: Erasable Ink... 194 Altering Checks Prepared by the Fraudster: Blank Checks... 195 Concealed Check Schemes... 195 Suggestions for Preventing and Detecting Schemes Whereby an Employee Alters the Payee and/or Amount on an Organization Check... 196 Authorized Maker Schemes... 196 Overriding Controls through Intimidation... 197 iii

VI. CHECK TAMPERING SCHEMES (CONT.) Poor Controls... 197 Suggestions for Preventing and Detecting Check Tampering By Authorized Check Signers... 199 Concealing Check Tampering... 200 The Fraudster Reconciling the Bank Statement... 200 Re-Altering Fraudulent Checks... 202 Falsifying the Disbursements Journal... 202 Coding the Fraudulent Checks... 203 Re-Issuing Intercepted Checks... 204 Bogus Supporting Documents... 204 Suggestions for Preventing and Detecting Check Tampering Schemes That Are Concealed By the Techniques Discussed Above... 205 Preventing and Detecting Check Tampering Schemes... 205 Separation of Duties... 205 Red Flags Check Tampering... 207 Account Analysis through Cut-off Statements... 208 Bank Confirmation... 209 General Control Objectives Check Tampering... 209 Bank-Assisted Controls... 210 Physical Tampering Prevention... 210 Review Questions... 212 VII. REGISTER DISBURSEMENT SCHEMES Overview... 216 Common Register Disbursement Schemes... 216 Failure to Require Approval on Register Disbursements... 218 Rubber Stamp Managers... 220 Forged Approval... 220 Collusion with a Manager... 221 Refunds and Voids Below the Minimum Approval Amount... 221 Credit Card Refunds... 222 Destroying Records of the Transaction... 222 Suggestions for Preventing and Detecting Fraudulent Refunds and Voids... 223 Preventing and Detecting Register Schemes... 223 Fictitious Refunds or Voided Sales... 223 Red Flags Register Disbursement Schemes... 224 Prevention of Register Disbursement Schemes... 224 Review Questions... 226 VIII. INVENTORY, SUPPLIES, AND FIXED ASSETS Overview... 229 Misuse of Fixed Assets... 229 The Costs of Inventory Misuse... 230 Suggestions for Preventing and Detecting Misuse of Fixed Assets... 230 Theft of Inventory, Supplies, and Fixed Assets... 231 Unconcealed Larceny... 231 Fraudulent Requisitions and Transfers... 237 Falsified Receiving Reports... 238 iv

VIII. INVENTORY, SUPPLIES, AND FIXED ASSETS (CONT.) Fraudulent Shipments of Merchandise... 238 Concealing Inventory Shrinkage... 243 Altered Inventory Records... 244 Fictitious Sales and Accounts Receivable... 244 Write Off Missing Non-Cash Assets... 245 Physical Padding... 245 Preventing and Detecting Theft or Misuse of Inventory, Supplies, and Fixed Assets... 245 Acquiring, Storing, and Shipping Inventory... 245 Red Flags Inventory Theft Schemes... 248 Statistical Sampling... 248 Perpetual Inventory Records... 249 Shipping Documents... 249 Physical Inventory Counts... 249 Analytical Review... 249 Control Objectives Inventory Schemes... 251 Preventing Inventory Fraud... 252 Review Questions... 253 IX. CONCLUSION Bob Daniel Case Study... 256 Summing Up... 260 X. PRACTICAL PROBLEMS... 261 XI. SOLUTIONS TO REVIEW QUESTIONS... 298 XII. SOLUTIONS TO PRACTICAL PROBLEMS... 335 FINAL EXAMINATION... E-1 v