Small Business FRAUD PREVENTION Manual

Similar documents
THE SMALL BUSINESS FRAUD PREVENTION MANUAL

716 West Ave Austin, TX USA

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION (NO )

OTHER PEOPLE S MONEY: THE BASICS OF ASSET MISAPPROPRIATION

THE CORPORATE CON: INTERNAL FRAUD AND THE AUDITOR

FRAUD-RELATED INTERNAL CONTROLS

716 West Ave Austin, TX USA

Fraud awareness & Information pack for ANZ Customers

Cyber Insurance: What is your bank doing to manage risk? presented by

Nebraska State College System Cellular Services Procedures Effective Date June 15, 2012 Updated August 13, 2015

Preventing fraud in public sector entities

Red Flags/Identity Theft Prevention Policy: Purpose

Prevention of Identity Theft in Student Financial Transactions AP 5800

How technology changed fraud investigations. Jean-François Legault Senior Manager Analytic & Forensic Technology June 13, 2011

Information Security Policy

SANMINA CORPORATION PRIVACY POLICY. Effective date: May 25, 2018

[Utility Name] Identity Theft Prevention Program

Seattle University Identity Theft Prevention Program. Purpose. Definitions

Identity Theft Prevention Program. Effective beginning August 1, 2009

University of North Texas System Administration Identity Theft Prevention Program

security FRAUD PREVENTION Business Checklist Safeguard your money, your credit and your good name.

( Utility Name ) Identity Theft Prevention Program

INDEPENDENT REGISTERED REPRESENTATIVE ANNUAL CERTIFICATION

NIPPON VALUE INVESTORS DATA PROTECTION POLICY

Frauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam

Securing Information Systems

Red Flag Policy and Identity Theft Prevention Program

The Readlyn Telephone Company dba RTC Communications NETWORK MANAGEMENT AND ACCEPTABLE USE POLICY Internet Service

Legal Considerations and Case Studies

ma recycle GDPR Privacy Policy .com Rely and Comply... Policy Date: 24 May 2018

City of New Haven Water, Sewer and Natural Gas Utilities Identity Theft Prevention Program

U.S. Private-sector Privacy Certification

Identity Theft Policies and Procedures

Vendor Fraud. Goals of Presentation. Detection and Investigation

PROVIDING INVESTIGATIVE SOLUTIONS

WHO PROTECTS YOUR MAIL? MAILERS TECHNICAL ADVISORY COMMITTEE Guy Cottrell, Chief Postal Inspector

Personal Cybersecurity

Information Security Incident Response Plan

1. Muscat & Co Mortgage Solutions Ltd - Privacy Notice

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

region16.net Acceptable Use Policy ( AUP )

Identity Theft Victim s Complaint and Affidavit

Ouachita Baptist University. Identity Theft Policy and Program

WEBSITE PRIVACY POLICY

We will divide the many telecom fraud schemes into three broad categories, based on who the fraudsters are targeting. These categories are:

NOT-FOR- PROFIT SERVICES GROUP Client Information Bulletin

Online Fraud and Identity Theft Guide. A Guide to Protecting Your Identity and Accounts

ADVISORY. Forensic services. Protecting your business from fraud, misconduct and non-compliance. kpmg.com/in

Credit Card Data Compromise: Incident Response Plan

Document Title: Electronic Data Protection and Encryption Policy. Revision Date Authors Description of Changes

The BUSINESS of Fraud. Don t let it put you out of business. AFFILIATE LOGO

Cyber Attacks and Data Breaches: A Legal and Business Survival Guide

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

STOCKTON UNIVERSITY PROCEDURE DEFINITIONS

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

IMEI Counterfeit Update

Red Flag Regulations

Common Scams and Fraud. Charlottesville/Albemarle County TRIAD Group

A Framework for Managing Crime and Fraud

Information Security Incident Response Plan

The. CB Certified. Bookkeeper. Designation. Preparing Your CE Students for the National Certification Examination

Data Security: Public Contracts and the Cloud

Cybercrime and Information Security for Financial Institutions. AUSA Jared M. Strauss U.S. Attorney s Office So. District of Florida

Identity Theft Prevention Policy

HIPAA UPDATE. Michael L. Brody, DPM

Chapter 6 Network and Internet Security and Privacy

Privacy Policy Effective May 25 th 2018

Regulation P & GLBA Training

LIST RENTAL CONTRACT

Overview Bank IT examination perspective Background information Elements of a sound plan Customer notifications

The New Robber Barons: stealing profits and damaging our economy Martin S. Bressler Professor of Marketing & Entrepreneurship Houston Baptist Universi

IDENTITY THEFT PREVENTION Policy Statement

Red ALERT Apparent Breach of an Unidentified Pharmacy Related Database

YOUR PRIVACY RIGHTS Privacy Policy General Col ection and Use voluntarily

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

2 New Company Setup OBJECTIVES:

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

Federal Trade Commission Protecting Consumer Privacy. J. Howard Beales, III, Director Bureau of Consumer Protection Federal Trade Commission

Safeguarding Your Dealership from Fraud

Mobile Wallet Service Terms and Conditions

IS Today: Managing in a Digital World 9/17/12

II.C.4. Policy: Southeastern Technical College Computer Use

Lesson Three: False Claims Act and Health Insurance Portability and Accountability Act (HIPAA)

The Dime Bank Security Tips

Radix Acceptable Use and Anti-Abuse Policy

USER CORPORATE RULES. These User Corporate Rules are available to Users at any time via a link accessible in the applicable Service Privacy Policy.

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

FinFit will request and collect information in order to determine whether you qualify for FinFit Loans*.

Acceptable Use Policy for EWC HousingNet Internet Service Customers

State of New Mexico Public School Facilities Authority Information Technology (IT) Acceptable Use Policy

Policy 24 Identity Theft Prevention Program IDENTITY THEFT PREVENTION PROGRAM OF WEBB CREEK UTILITY DISTRICT

You are signing up to use the Middlesex Savings Bank Person to Person Service powered by Acculynk that allows you to send funds to another person.

INTERNATIONAL SCHOOLS SERVICES, INC. PRIVACY POLICY

Retail/Consumer Client Internet Banking Awareness and Education Program

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL

Detect, Denounce, Deter

Client Resources. participant guide

CYBERCRIME The Legal Issues

FACTS WHAT DOES FARMERS STATE BANK DO WITH YOUR PERSONAL INFORMATION? WHY? WHAT? HOW? L QUESTIONS?

Transcription:

Small Business FRAUD PREVENTION Manual

TABLE OF CONTENTS PREFACE... ix PART 1: INTERNAL FRAUD THREATS I. INTRODUCTION TO EMPLOYEE FRAUD The Shocking Cost of Employee Theft and Fraud... 1 The Cost of Fraud to Small Businesses... 2 Methods of Fraud in Small Businesses... 3 Why Employees Commit Fraud... 4 Donald R. Cressey and the Fraud Triangle... 4 Continuing Conduct... 10 Working Conditions and Fraud... 11 The Hollinger-Clark Study: The Effect of Workplace Conditions... 11 Who Is the Typical Fraudster?... 16 Who Is the Typical Fraudster? Analysis... 16 2016 Report to the Nations... 17 II. HOW EMPLOYEES STEAL CASH FRAUD Introduction... 19 Cash Theft... 19 Types of Cash Theft Schemes... 20 Skimming and Larceny... 20 Unrecorded Sales... 20 Skimming Receivables... 24 Cash Larceny from the Deposit... 28 Deterring and Detecting Skimming and Cash Larceny... 30 Accounting Anomalies That Indicate Skimming... 31 Trend Analysis... 33 Using Customers to Detect Skimming... 34 General Control Objectives for Cash Receipts... 34 Maintaining Physical Security of Cash... 35 Billing Schemes... 36 Shell Company Schemes... 36 Non-Accomplice Vendor Schemes... 41 Personal Purchases with Company Funds... 42 Deterring and Detecting Billing Schemes... 43 Determining Who Is Involved in a Billing Scheme... 47 Determining Whether a Vendor Is Legitimate... 50 Control Objectives for Preventing Billing Schemes... 52 Payroll Schemes... 54 Falsified Hours and Salary... 54 i

II. HOW EMPLOYEES STEAL CASH FRAUD (CONT.) Ghost Employees... 57 Commission Schemes... 58 Deterring and Detecting Payroll Schemes... 58 Control Objectives for Preventing Payroll Schemes... 61 Expense Reimbursement Schemes... 62 Mischaracterized Expense Reimbursements... 63 Overstated Expense Reimbursements... 64 Fictitious Expense Reimbursements... 65 Multiple Reimbursements... 66 Deterring and Detecting Expense Reimbursement Schemes... 66 Red Flags of Expense Reimbursement Schemes... 67 Check Tampering... 68 Forged Maker Schemes... 68 Forged Endorsement Schemes... 70 Altered Payee Schemes... 71 Authorized Maker Schemes... 72 How Check Tampering Is Concealed... 73 Detection of Check Tampering Schemes... 75 Prevention of Check Tampering Schemes... 77 Electronic Payment Tampering... 79 Prevention and Detection of Electronic Payment Tampering... 80 Cash Register Disbursement Schemes... 81 Common Register Disbursement Schemes... 82 Control Weaknesses... 82 Detection of Register Disbursement Schemes... 84 Prevention of Register Disbursement Schemes... 85 III. HOW EMPLOYEES STEAL INVENTORY, EQUIPMENT, AND OTHER ASSETS Misuse of Inventory and Other Assets... 87 The Costs of Inventory Misuse... 87 Types of Noncash Theft... 88 Unconcealed Larceny... 88 Falsified Receiving Reports... 89 Fraudulent Shipments... 90 Fraudulent Write-Offs... 90 Concealing Inventory Shrinkage... 90 Altered Inventory Records... 91 Fictitious Sales and Accounts Receivable... 91 Write Off Missing Noncash Assets... 92 Physical Padding... 92 Detecting the Theft of Inventory, Equipment, and Supplies... 92 Review of Perpetual Inventory Records... 92 ii

III. HOW EMPLOYEES STEAL INVENTORY, EQUIPMENT, AND OTHER ASSETS (CONT.) Review of Shipping Documents... 92 Analytical Review... 93 Physical Inventory Counts... 93 Preventing Inventory Fraud... 93 Proper Documentation... 93 Segregation of Duties... 94 Independent Checks... 94 Physical Safeguards... 94 Red Flags of Inventory Theft Schemes... 94 IV. PREVENTING EMPLOYEE THEFT Selecting the Right Employee... 97 Past Employment Verification... 97 Criminal Conviction Checks... 97 Drug Screening... 98 Reference Checks... 98 Education and Certification Verification... 98 Get the Consent of the Candidate... 98 Policies and Procedures That Help Eliminate Employee Dishonesty... 98 Environmental Conditions... 98 Provide Incentives for Honest Employees... 99 Control Conditions... 99 Policies and Procedures That Help Deter Fraud... 100 Perception of Detection... 100 Proactive Programs... 100 Monitoring Systems... 103 Insuring Against Dishonesty... 104 PART 2: EXTERNAL FRAUD THREATS V. CHECK FRAUD Introduction... 107 Counterfeiting Checks... 108 Signs of Counterfeit and Forged Checks... 108 Check Fraud Vulnerabilities... 108 Check Theft... 109 Check Fraud Schemes... 109 Check Fraud Rings... 112 Check Fraud Detection... 113 Check Fraud Prevention... 114 iii

VI. CREDIT CARD SCHEMES Introduction... 117 Credit Card Schemes... 117 Unauthorized Use of a Lost or Stolen Card... 117 Organized Crime Rings... 118 Advance Payments... 118 Stolen Card Numbers... 118 Counterfeit Cards... 119 Telephone and Mail Order Fraud... 119 False Applications... 120 Credit Doctors... 120 True Name Fraud... 120 Non-Receipt Fraud... 120 Key-Enter Counterfeiting... 120 Creditmaster... 121 Skimming... 121 Pretext Calling... 122 Account Takeover... 122 Institutional Identity Theft and Spoof Sites... 122 Merchant Scams... 123 Company Credit Cards... 124 Smart Cards... 124 Hybrid Smart Cards... 125 The Law Concerning Credit Card Fraud... 125 Credit Card Fraud Detection... 126 Credit Card Fraud Prevention... 127 Education Programs... 128 Liaison with Law Enforcement... 128 Credit Card Company Security Initiatives... 128 Evolving Credit Card Security Features... 130 Technological Deterrents... 131 Photographs... 131 Holograms... 131 Signature Panel... 131 Activation of Cards... 131 Advanced Authorization... 132 Unusual Activity Monitoring... 132 Card Scrutiny at Point of Sale... 132 Internet and Telephone Orders... 132 Financial Institution Measures... 133 Protecting Credit Card Payment Data from Intrusion... 134 iv

VII. COMPUTER FRAUD Potential Impact of Computer Crime... 137 Securing Computers... 138 Electronic Security... 138 Internet Fraud... 142 Combating Internet Fraud... 143 Computer Hacking... 144 Methods Used to Gain Unauthorized Access... 145 VIII. SHOPLIFTING Introduction... 151 Types of Shoplifters... 151 Amateur Shoplifters... 151 Professional Shoplifters... 152 Shoplifting Methods... 153 Sleight-of-Hand... 153 Devices... 153 Distraction... 154 Employees as Shoplifters... 154 Training Methods of Shoplifters... 155 Shoplifting Detection... 155 Physical Characteristics... 155 Behavioral Characteristics... 156 Shoplifting Prevention... 157 Prevention Techniques... 157 What to Do with the Shoplifter... 160 Confronting and Detaining Shoplifters... 161 Investigation of a Suspect... 162 Criminal and Civil Actions... 164 IX. HOW VENDORS CAN CHEAT SMALL BUSINESSES Bribery: Kickbacks and Gratuities... 165 Methods of Making Illegal Payments... 166 Bribery Scheme Types... 168 Economic Extortion... 174 Illegal Gratuities... 174 Detection of Bribery Schemes... 175 Red Flags Associated with Employees... 176 Red Flags Associated with Vendors... 177 Red Flags Associated with the Corrupt Recipient... 177 Red Flags Associated with the Corrupt Payer... 178 Other Red Flags... 178 Keeping Suppliers Honest... 179 v

IX. HOW VENDORS CAN CHEAT SMALL BUSINESSES (CONT.) Conduct Background Checks... 179 Check References... 179 Check Billings and Invoices... 179 Question Suppliers... 180 Vendor On-Site Audit... 180 Vendor Questionnaire... 181 X. CON SCHEMES AND OTHER SCAMS Telemarketing Frauds... 185 Telemarketing Terminology... 185 Telemarketing Suppliers... 186 Telemarketing Scams Targeting Businesses... 187 Telemarketing Scams Enforcement and Prosecution... 195 Advance-Fee Swindles... 196 Types of Advance-Fee Swindles... 197 Advance-Fee Swindles Detection and Prevention... 198 Ponzi and Pyramid Schemes... 199 Accounts Receivable Schemes... 200 Ponzi Versus Pyramid... 200 Varieties of Pyramid Schemes... 201 Detecting and Preventing Pyramid and Ponzi Schemes... 205 Investment Swindles... 205 Methods of Investment Swindlers... 206 Types of Investment Swindles... 207 Prevention of Investment Swindles... 210 Identity Theft... 211 Business Identity Theft... 211 Profile of the Fraudster... 212 Common Ways of Obtaining Information... 212 Federal Identity Theft Statutes... 216 Identity Theft Guidance for Small Businesses... 217 Workers Compensation Fraud... 219 Red Flags of Workers Compensation Fraud... 220 Preventing Workers Compensation Fraud... 220 Tax Scams... 221 Employment Tax Evasion... 221 Tax Return Preparer Fraud... 221 Unreliable Third-Party Payers... 221 Improper Home-Based Business... 222 Other Common Scams... 222 Phony Invoices... 222 Cramming... 223 vi

X. CON SCHEMES AND OTHER SCAMS (CONT.) Phone Scams... 224 Slamming... 224 Nigerian 419 Fraud Schemes... 225 XI. WHAT TO DO IF YOU ARE A VICTIM OF FRAUD Dealing with Dishonest Employees... 231 Initiation: Detection and Identification... 231 Investigation and Development... 232 Documentation... 232 Detention... 232 Interview... 233 Disposition... 234 Avoiding Liability when Conducting Investigations... 235 Defamation... 235 Invasion of Privacy... 237 False Imprisonment... 238 Wrongful Termination... 239 Rights and Duties of Employees... 239 Employees Duty to Cooperate... 239 Employees Rights During the Investigation... 240 Workplace Searches... 242 Effect of Violation of Employee s Rights... 245 State Constitutions and Statutes... 245 Surveillance... 245 Polygraph Examinations... 249 Prosecuting Employees and Other Fraud Perpetrators... 250 Why Prosecute a Fraud Perpetrator?... 251 Aiding the Company s Civil Remedies and Litigation... 252 Malicious Prosecution... 253 Civil Actions Against Perpetrators... 254 Discovery... 254 Civil Trials... 254 Advantages and Disadvantages of Civil Litigation... 255 Will a Judgment Be Collectible?... 256 Ensuring Recovery of Property or Damages... 256 Enforcement of Money Judgments... 257 Discharging a Suspected Wrongdoer... 258 Just Cause... 259 Negligent Discharge... 259 Breach of Implied Contract... 259 vii

XI. WHAT TO DO IF YOU ARE A VICTIM OF FRAUD (CONT.) Breach of the Duty of Good Faith and Fair Dealing... 259 Discharge in Violation of Public Policy... 260 XII. REFERENCES... 261 viii