SlideShare a Scribd company logo
Is Your Payroll Being
Plundered?
February 27, 2013
Special Guest Presenter:
Katrina Kiselinchev, CIA, CPA, CFE, CFF

Copyright © 2013 FraudResourceNet™ LLC

About Peter Goldmann, MSc., CFE



President and Founder of White Collar Crime 101

Publisher of White-Collar Crime Fighter
Developer of FraudAware® Anti-Fraud Training
Monthly Columnist, The Fraud Examiner,
ACFE Newsletter

 Member of Editorial Advisory Board, ACFE
 Author of “Fraud in the Markets”
Explains how fraud fueled the financial crisis.

Copyright © 2013 FraudResourceNet™ LLC
About Jim Kaplan, MSc, CIA, CFE
 President and Founder of
AuditNet®, the global resource
for auditors
 Auditor, Web Site Guru,
Internet for Auditors Pioneer
Recipient of the IIA’s 2007
Bradford Cadmus Memorial
Award.
 Author of “The Auditor’s
Guide to Internet Resources”
2nd Edition
Copyright © 2013 FraudResourceNet™ LLC

About Katrina Kiselinchev, CPA, CIA, CFE, CFF








President of Inclusivitie, We Do “SMART”
Integration Partner with IDEA
Experience across industries, audit, fraud, and value
Achieved Value of $5+ Million & ROI of 2000+%,
which included using IDEA’s SMART Analyzer for
continuous monitoring & external reliance
Adjunct Professor at Georgia State University
Specific Fraud, in Payroll, Fake Checks & Hour Overages

Copyright © 2013 FraudResourceNet™ LLC
Webinar Housekeeping
This webinar and its material are the property of FraudResourceNet LLC.
Unauthorized usage or recording of this webinar or any of its material is strictly
forbidden. We will be recording the webinar and you will be provided access to
that recording within five business days after the webinar. Downloading or
otherwise duplicating the webinar recording is expressly prohibited.
Please complete the evaluation to help us continuously improve our Webinars.
You must answer the polling questions to qualify for CPE per NASBA.
Submit questions via the chat box on your screen and we will answer them
either during or at the conclusion.
If GTW stops working you may need to close and restart. You can always dial
in and listen and follow along with the handout.

Copyright © 2013 FraudResourceNet™ LLC

Learning Objectives







Costliest Forms of Internal & External Payroll Fraud
Who Commits Payroll Fraud
Gathering Accurate Data for Effective Data Analysis
Powerful and User-Friendly Audit Automation Tests
Techniques for Detecting Red Flags of Payroll Frauds
Data Analytics Results & Improving Preventative
Controls for Payroll

Copyright © 2013 FraudResourceNet™ LLC

5
Agenda











Introduction
Standards & Essentials
Fraud State of the Union
In the News: Costliest Forms of Payroll Fraud
Payroll Fraudsters
Planning for Payroll Fraud
Data Gathering for Payroll Data Analysis
Data Analysis & Payroll Fraud
Red Flag Detection & Payroll Fraud
Using Data Analysis Results to Improve Controls
Copyright © 2013 FraudResourceNet™ LLC

6

The Auditor’s Role

 IPPF Standard 1210.A3
 Internal auditors must have
sufficient knowledge of…available
technology based audit techniques
to perform their assigned work

Copyright © 2013 FraudResourceNet™ LLC
IIA Guidance – GTAG 13
Internal auditors require appropriate
skills and should use available
technological tools to help them
maintain a successful fraud
management program that covers
prevention, detection, and
investigation. As such, all audit
professionals — not just IT audit
specialists — are expected to be
increasingly proficient in areas such as
data analysis and the use of
technology to help them meet the
demands of the job.

Copyright © 2013 FraudResourceNet™ LLC

Professional Guidance

Copyright © 2013 FraudResourceNet™ LLC
Fraud State of the Union

2012 ACFE
Report to
the Nations

Copyright © 2013 FraudResourceNet™ LLC

Fraud State of the Union

2012 ACFE Report
to the Nations

Copyright © 2013 FraudResourceNet™ LLC
In the News:
Costliest Forms of Payroll Fraud
According to ACFE's "Report to the Nation on Occupational Fraud
and Abuse":
 > 39% of Fraud Cases in Payroll Occur in Business with < 99
Employees
 Payroll Fraud Accounts for Nearly 10 percent e.g. $60 Billion Annually
 Small Businesses Losses Average $127,500 per Scheme.
 Large Company Losses Average $97,000 per Scheme.

Ranked from Most to Least Costly
Occurrence
Ghost Employees
Commission Schemes
Workman’s Compensation
Falsified Wages

Average Per
$100,000 - $300,000
$100,000+
$100,000+
$50,000+

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 1

The median loss in 2012 for
owners/managers in fraud cases was
_______.
a. $182,000
b. $573,000
c. $60,000

Copyright © 2013 FraudResourceNet™ LLC
In the News:
Case of Being Asleep at the Wheel in the
City That Never Sleeps

Mayor Says Payroll Fraud “Slipped
Through the Cracks”
 Joel Bondy, Head of NYC Payroll hired Mark
Mazer, a “quality assurance” consultant and gave
him authority and budget to hire subcontractors.
 Mazer awarded “subcontract” of $55 million to a
company owned by his uncle… one for $20 million
to a friend … one worth $1.4 million to another
friend.
 Each “ghost subcontractor” kicked back 1/3 to
Mazer thru shell companies owned by his wife and
his mother.
Total cost to NYC payroll budget: $80 million

Copyright © 2013 FraudResourceNet™ LLC

Payroll Fraudsters: Perpetrators

Copyright © 2013 FraudResourceNet™ LLC
Payroll Fraudsters: Perpetrators

Copyright © 2013 FraudResourceNet™ LLC

Polling Question 2

The duration of payroll incidents in 2012 was...
a.
b.
c.
d.

24 months
18 months
36 months
12 months

Copyright © 2013 FraudResourceNet™ LLC
Data Gathering for
Payroll Data Analysis
 Request All Meta Data Fields
 Name
 Employee ID
 Address
 Rate of Pay
 Commission
 History for X Time Period
 Additions & Changes to Status
 Changes to Fields & Who Made Them

Copyright © 2013 FraudResourceNet™ LLC

Auditing for Payroll Fraud
 Request Access Listing & Last Activity from IT
 Provide Employee Listing from Payroll & 100% Alignment with
Access









Cross Reference IT to Active Employees Paid (Join)
Review Employees with High Withholding Exemptions
Review Employees with Low (or no) Tax Withholdings
Request Data of Employees with No Voluntary Deductions
Request a No-PTO-Used Report for Employees
Request a Listing of Employees with No Changes > 6 Months
Request a Listing of Employee & Deposit Accounts (Dups)
Any Red Flags Could Equal a Problem!
Copyright © 2013 FraudResourceNet™ LLC
Red Flags of Payroll Fraud

 Allowances/Garnishments to Disallowed Positions



Overtime for Salaried Employees
Meal allowances to Unqualified Employees

 Employees on the payroll that do not appear on the:







Phone listings, Human Resources employee listing etc

Same Bank Account Numbers for Two Employees
Excessive Overtime
Excessive Commissions “Earned”
Gross pay = Net Pay (no deductions)
Continued…

Copyright © 2013 FraudResourceNet™ LLC

Red Flags for Payroll Fraud (continued)











Duplicate Payments & Time
Modified Time by Other Employees
Employees with No Vacation Time Paid
Employees Paid with Non-Standard Checks
Two employees with Same Social Security #
Same address for 2+ Employees
Oddly-timed Pay Increases
Ex-employees with Paychecks

Copyright © 2013 FraudResourceNet™ LLC
Behavioral Red Flags








Unexplained Wealth
Sudden Unusual Mood Swings
Financial Problems e.g. Credit card or other debt
Family problems e.g. divorce, child access issues
Gambling Problems
Addiction to Drugs / Alcohol
Copyright © 2013 FraudResourceNet™ LLC

Polling Question 3

What Additional Items Should Be Requested
Beyond Meta Data Standard Fields?
a.
b.
c.
d.

Access & Activity Listing from IT
Employees with All Changes
Neither of the Above
Both a and b
Copyright © 2013 FraudResourceNet™ LLC
Top 10 Areas for Data Analysis
1) Accounts Payable & Accounts Receivable
 Purchasing to Payment Analysis
 Review of Operating Disbursements
 Validation of Payments to Vendors
 Analyzing AR Open Orders for Process Deficiencies
 Evaluating AR Aging for Internal and External Financial Reporting
 AR Testing and Searching for Duplicate Payments
2) Duplicate Detection (Payroll)
 Fraud, Errors, Anomalies, or Outliers
 Payments, Invoices, Transactions, Credits
Results from Survey Conducted by Audimation Services, Inc. in 2011

Copyright © 2013 FraudResourceNet™ LLC

Top 10 Areas for Data Analysis
cont.
3) Sampling
 Ability to Test 100%
 Adequate Representation
 Scope Setting

4) Data Imports/Extracts & Analysis of Large Data Sets





Text
PDF
Excel
Word

5) Continuous Auditing & Monitoring





Financial Statements & Areas
Travel & Entertainment
Disbursements(Payroll)
Human Resources
Results from Survey Conducted by Audimation Services, Inc. in 2011
Copyright © 2013 FraudResourceNet™ LLC
Polling Question 4

Which of the following could be red flags
of payroll fraud (choose all that apply)
1.
2.
3.
4.
5.

Different Bank Accounts
No Overtime for Salaried Employees
Overtime for Salaried Employees
Gross Pay = Net Pay
Terminated employees receiving paychecks

Copyright © 2013 FraudResourceNet™ LLC

Top 10 Areas for Data Analysis
cont.
6) Fraud Detection & Forensics
 Red Flags & Discovery (Payroll)
7) Analysis of P - Cards
Reviewing Internal Controls
Process Determination
Fraud Detection
8) Payroll & Time Sheets (Payroll)
Ghost Employees
Falsified Wage Sheets & Time Cards
Weekly / Monthly Reasonableness
Compliance Review e.g. Approvals
Results from Survey Conducted by Audimation Services, Inc. in 2011
Copyright © 2013 FraudResourceNet™ LLC
Top 10 Areas for Data Analysis
cont.
9) Joins & Comparisons
 Active Application Users vs. List of Terminated Employees
 Physician Scheduling System to the Billing System
 Vendor Terms including Early Payments & Aging
 Tax ID numbers and Conflict of Interest
 Review of Billing & Pricing vs. Contracts
 Missing Invoice Numbers
 Employee to Vendor Address
10) Inventory
 Obsolescence
 Slow Moving
 Reconciliations
Results from Survey Conducted by Audimation Services, Inc. in 2011
Copyright © 2013 FraudResourceNet™ LLC

Using Data Analysis to
Improve Controls

 Don’t Simply React to Findings
 Determine What is Not Happening
 Improve the Environment

Copyright © 2013 FraudResourceNet™ LLC
Payroll Control Improvement
Prevention of Unauthorized Raises
 Segregation of Duties for Preparation, Disbursement, and
Distribution.
 Restrict Access to the Software & Keep Passwords Safe
 Have Removed Approver for Payroll
 Compare Wages Approved vs. Paid Quarterly
 Review Budget v. Actual Monthly.
Prevention of Creation of Ghost Employees
 Do all Employees Have Deductions?
 Do All Match IT Access Listing?
 Implement Controls That Don’t Allow Addition of Payroll Without
Confirmed IT Access
Copyright © 2013 FraudResourceNet™ LLC

Preventing Payroll Fraud
Ghost Employees
 Conduct periodic payroll audits in which all employees must physically sign
 Review payroll for duplicate addresses or Social Security numbers.
(Sample)
 Investigate all returned W-2 forms.
 Verify Social Security numbers with Social Security Administration.
 Randomly review payroll database for employees with P.O. boxes or No
Deductions
 Require direct mailing of checks or have management distribute them
physically
Types: Terminated, Fake, No Show, Temporary, Rehire, and Pre-employment
Ghost

Copyright © 2013 FraudResourceNet™ LLC
Preventing Payroll Fraud
Worker’s Compensation





Maintain cameras in your workplace to capture accidents.
Require that injuries are reported promptly.
Receive concurring medical opinions for certain injuries.
Consider retaining private investigators to monitor employee actions.

Falsified Wages








Sophisticated time clocks or systems that require a unique employee
pass code.
Require manager or supervisor approval of all timecards or timesheets,
including overtime.
Executive approval of all bonus-type compensation.
Mandatory vacations for at risk employees.
Executive approval of all paychecks.
The ability to modify wage rates, add employees are restricted.
These individuals should have their records periodically reviewed.
Copyright © 2013 FraudResourceNet™ LLC

Preventing Payroll Fraud
Commission Schemes
 Periodically review your commission structure for needed changes
aligned to business?
 Are you recovering commissions overpaid to employees or paid for
cancelled sales?
 Review financial correlations. Are sales commissions increasing
when sales are dropping?
 Closely audit some of your top performers. Are commissions
justified?
 Re-perform commission pay-outs (Sample)

Copyright © 2013 FraudResourceNet™ LLC
Polling Question 5

Obtaining concurring medical opinions for
employee injuries is key to auditing for...
a.
b.
c.
d.

Ghost employee schemes
Commission schemes
Worker’s comp fraud
None of the above

Copyright © 2013 FraudResourceNet™ LLC

Questions?
 Any Questions?
Don’t be Shy!

Copyright © 2013 FraudResourceNet™ LLC
Thank You!
Website: http://www.fraudresourcenet.com
Jim Kaplan
FraudResourceNet™
800-385-1625
jkaplan@fraudresourcenet.com
Peter Goldmann
FraudResourceNet™
800-440-2261
pgoldmann@fraudresourcenet.com
Katrina Kiselinchev
Inclusivitie, LLC
832-236-4778
katrina@inclusivitie.com
http://www.inclusivitie.com
Copyright © 2013 FraudResourceNet™ LLC

More Related Content

What's hot

Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
FraudBusters
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
FraudBusters
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
FraudBusters
 
AC 465 Entire Course New
AC 465 Entire Course NewAC 465 Entire Course New
AC 465 Entire Course New
shyaminfo30
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
FraudBusters
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
FraudBusters
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
FraudBusters
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
FraudBusters
 

What's hot (8)

Using Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay FraudUsing Data Analytics to Detect and Deter Procure to Pay Fraud
Using Data Analytics to Detect and Deter Procure to Pay Fraud
 
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
Quick Response Fraud Detection using Data Analytics: Hitting the Ground Runni...
 
Establishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud PolicyEstablishing an Organization Wide Fraud Policy
Establishing an Organization Wide Fraud Policy
 
AC 465 Entire Course New
AC 465 Entire Course NewAC 465 Entire Course New
AC 465 Entire Course New
 
Protecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH FraudProtecting Your Organization Against Check and ACH Fraud
Protecting Your Organization Against Check and ACH Fraud
 
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data AnalysisRecognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
Recognizing and Preventing Fixed Asset and Inventory Fraud using Data Analysis
 
Using Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic AuditUsing Data Analytics to Conduct a Forensic Audit
Using Data Analytics to Conduct a Forensic Audit
 
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data AnalysisDetecting and Auditing for Fraud in Financial Statements Using Data Analysis
Detecting and Auditing for Fraud in Financial Statements Using Data Analysis
 

Viewers also liked

Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
Brett Reynolds
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
Spectorsoft
 
Hr analytics
Hr analyticsHr analytics
Hr analyticsE P John
 
HR Analytics, Done Right
HR Analytics, Done RightHR Analytics, Done Right
HR Analytics, Done Right
Trendwise Analytics
 
Detecting Fraud Using Data Mining Techniques
Detecting Fraud Using Data Mining TechniquesDetecting Fraud Using Data Mining Techniques
Detecting Fraud Using Data Mining TechniquesDecosimoCPAs
 
HR / Talent Analytics
HR / Talent AnalyticsHR / Talent Analytics
HR / Talent Analytics
Akshay Raje
 
HR Analytics & HR Tools
HR Analytics & HR ToolsHR Analytics & HR Tools
HR Analytics & HR Tools
NHRD Pune Chapter
 

Viewers also liked (7)

Fraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and moreFraud, Waste & Abuse: Capture low hanging fruit and more
Fraud, Waste & Abuse: Capture low hanging fruit and more
 
User Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To CompaniesUser Behavior Analytics And The Benefits To Companies
User Behavior Analytics And The Benefits To Companies
 
Hr analytics
Hr analyticsHr analytics
Hr analytics
 
HR Analytics, Done Right
HR Analytics, Done RightHR Analytics, Done Right
HR Analytics, Done Right
 
Detecting Fraud Using Data Mining Techniques
Detecting Fraud Using Data Mining TechniquesDetecting Fraud Using Data Mining Techniques
Detecting Fraud Using Data Mining Techniques
 
HR / Talent Analytics
HR / Talent AnalyticsHR / Talent Analytics
HR / Talent Analytics
 
HR Analytics & HR Tools
HR Analytics & HR ToolsHR Analytics & HR Tools
HR Analytics & HR Tools
 

Similar to Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics

Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
FraudBusters
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
FraudBusters
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
FraudBusters
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
FraudBusters
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
FraudBusters
 
5 w's of Work Comp - Srinivas Ratnam
5 w's of Work Comp - Srinivas Ratnam 5 w's of Work Comp - Srinivas Ratnam
5 w's of Work Comp - Srinivas Ratnam
Napier University
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
FraudBusters
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
FraudBusters
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
FraudBusters
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
FraudBusters
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
FraudBusters
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
FraudBusters
 
Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Fraud barriers and fixed your income.
Fraud barriers and fixed your income.
Abdur Rahman (Sagor)
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
FraudBusters
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
Strategic Treasurer
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!
Oracle
 
Know the Norm of Hiring Payroll Services
Know the Norm of Hiring Payroll ServicesKnow the Norm of Hiring Payroll Services
Know the Norm of Hiring Payroll Services
Human Impact Israel
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Perficient, Inc.
 
Why do employees leave and what to do about it
Why do employees leave and what to do about itWhy do employees leave and what to do about it
Why do employees leave and what to do about it
Aasheesh Barvey
 
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditLinda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
The Athletic Mindset
 

Similar to Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics (20)

Uncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data AnalysisUncovering Fraud in Key Financial Accounts using Data Analysis
Uncovering Fraud in Key Financial Accounts using Data Analysis
 
Management Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red FlagsManagement Override: Common Tactics and How to Audit For Red Flags
Management Override: Common Tactics and How to Audit For Red Flags
 
Benford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial DataBenford's Law: How to Use it to Detect Fraud in Financial Data
Benford's Law: How to Use it to Detect Fraud in Financial Data
 
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data AnalyticsEffective General Ledger and Journal Entry Fraud Detection Using Data Analytics
Effective General Ledger and Journal Entry Fraud Detection Using Data Analytics
 
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not EnoughContinuous Controls Monitoring: Putting Controls in Place is Not Enough
Continuous Controls Monitoring: Putting Controls in Place is Not Enough
 
5 w's of Work Comp - Srinivas Ratnam
5 w's of Work Comp - Srinivas Ratnam 5 w's of Work Comp - Srinivas Ratnam
5 w's of Work Comp - Srinivas Ratnam
 
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory FraudHow to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
How to Use Data Analytics to Detect Fixed Asset and Inventory Fraud
 
Fraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s BlueprintFraud Risk Assessment: An Expert’s Blueprint
Fraud Risk Assessment: An Expert’s Blueprint
 
Bribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to KnowBribery and Corruption (FCPA): What Auditors Need to Know
Bribery and Corruption (FCPA): What Auditors Need to Know
 
Essentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness ProgramEssentials of a Highly Effective Employee Fraud Awareness Program
Essentials of a Highly Effective Employee Fraud Awareness Program
 
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data AnalysisWays to Beat Vendor and Procurement Fraudsters Using Data Analysis
Ways to Beat Vendor and Procurement Fraudsters Using Data Analysis
 
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity.Ethics for Auditors: Understanding Current Issues in Financial Integrity
.Ethics for Auditors: Understanding Current Issues in Financial Integrity
 
Fraud barriers and fixed your income.
Fraud barriers and fixed your income.Fraud barriers and fixed your income.
Fraud barriers and fixed your income.
 
Setting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud HotlineSetting Up and Managing an Anonymous Fraud Hotline
Setting Up and Managing an Anonymous Fraud Hotline
 
Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security Combating Fraud: Six Principles for Security
Combating Fraud: Six Principles for Security
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!
 
Know the Norm of Hiring Payroll Services
Know the Norm of Hiring Payroll ServicesKnow the Norm of Hiring Payroll Services
Know the Norm of Hiring Payroll Services
 
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud SolutionsFortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
Fortify Your Enterprise with IBM Smarter Counter-Fraud Solutions
 
Why do employees leave and what to do about it
Why do employees leave and what to do about itWhy do employees leave and what to do about it
Why do employees leave and what to do about it
 
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium AuditLinda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
Linda Webb aka The Fraud Dog, presents - Swarm interaction with Premium Audit
 

More from FraudBusters

Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
FraudBusters
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
FraudBusters
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
FraudBusters
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
FraudBusters
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
FraudBusters
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
FraudBusters
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
FraudBusters
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
FraudBusters
 

More from FraudBusters (8)

Fraud Incident Response Planning Essentials
Fraud  Incident Response Planning EssentialsFraud  Incident Response Planning Essentials
Fraud Incident Response Planning Essentials
 
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement FraudProactive Data Analysis Techniques to Detect Financial Statement Fraud
Proactive Data Analysis Techniques to Detect Financial Statement Fraud
 
The Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding FraudThe Power of Benford's Law in Finding Fraud
The Power of Benford's Law in Finding Fraud
 
Background Check Best Practices
Background Check Best PracticesBackground Check Best Practices
Background Check Best Practices
 
Best Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your AuditsBest Practices: Planning Data Analytic into Your Audits
Best Practices: Planning Data Analytic into Your Audits
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm ThemFraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
Fraudulent Documentation: Fraudsters’ Secret Weapon ... How to Disarm Them
 

Recently uploaded

一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
nexop1
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
SerdarHudaykuliyew
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Kezex (KZX)
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
Writo-Finance
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
DOT TECH
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
mikemetalprod
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
DOT TECH
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
conose1
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
DOT TECH
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
DOT TECH
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
Globalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdfGlobalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdf
VohnArchieEdjan
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
obyzuk
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
shetivia
 
Managing marketing information to gain customer insights
Managing marketing information to gain customer insightsManaging marketing information to gain customer insights
Managing marketing information to gain customer insights
sanamalam3
 

Recently uploaded (20)

一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
一比一原版(UoB毕业证)伯明翰大学毕业证如何办理
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
Donald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptxDonald Trump Presentation and his life.pptx
Donald Trump Presentation and his life.pptx
 
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdfWhich Crypto to Buy Today for Short-Term in May-June 2024.pdf
Which Crypto to Buy Today for Short-Term in May-June 2024.pdf
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
Financial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptxFinancial Assets: Debit vs Equity Securities.pptx
Financial Assets: Debit vs Equity Securities.pptx
 
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
Tax System, Behaviour, Justice, and Voluntary Compliance Culture in Nigeria -...
 
can I really make money with pi network.
can I really make money with pi network.can I really make money with pi network.
can I really make money with pi network.
 
BYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptxBYD SWOT Analysis and In-Depth Insights 2024.pptx
BYD SWOT Analysis and In-Depth Insights 2024.pptx
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
 
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理一比一原版(IC毕业证)帝国理工大学毕业证如何办理
一比一原版(IC毕业证)帝国理工大学毕业证如何办理
 
What website can I sell pi coins securely.
What website can I sell pi coins securely.What website can I sell pi coins securely.
What website can I sell pi coins securely.
 
when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.when will pi network coin be available on crypto exchange.
when will pi network coin be available on crypto exchange.
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
Globalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdfGlobalization (Nike) Presentation PPT Poster Infographic.pdf
Globalization (Nike) Presentation PPT Poster Infographic.pdf
 
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
一比一原版(GWU,GW毕业证)加利福尼亚大学|尔湾分校毕业证如何办理
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
Intro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptxIntro_Economics_ GPresentation Week 4.pptx
Intro_Economics_ GPresentation Week 4.pptx
 
Managing marketing information to gain customer insights
Managing marketing information to gain customer insightsManaging marketing information to gain customer insights
Managing marketing information to gain customer insights
 

Is Your Payroll Being Plundered - Detecting Payroll Fraud Using Data Analytics

  • 1. Is Your Payroll Being Plundered? February 27, 2013 Special Guest Presenter: Katrina Kiselinchev, CIA, CPA, CFE, CFF Copyright © 2013 FraudResourceNet™ LLC About Peter Goldmann, MSc., CFE  President and Founder of White Collar Crime 101 Publisher of White-Collar Crime Fighter Developer of FraudAware® Anti-Fraud Training Monthly Columnist, The Fraud Examiner, ACFE Newsletter  Member of Editorial Advisory Board, ACFE  Author of “Fraud in the Markets” Explains how fraud fueled the financial crisis. Copyright © 2013 FraudResourceNet™ LLC
  • 2. About Jim Kaplan, MSc, CIA, CFE  President and Founder of AuditNet®, the global resource for auditors  Auditor, Web Site Guru, Internet for Auditors Pioneer Recipient of the IIA’s 2007 Bradford Cadmus Memorial Award.  Author of “The Auditor’s Guide to Internet Resources” 2nd Edition Copyright © 2013 FraudResourceNet™ LLC About Katrina Kiselinchev, CPA, CIA, CFE, CFF       President of Inclusivitie, We Do “SMART” Integration Partner with IDEA Experience across industries, audit, fraud, and value Achieved Value of $5+ Million & ROI of 2000+%, which included using IDEA’s SMART Analyzer for continuous monitoring & external reliance Adjunct Professor at Georgia State University Specific Fraud, in Payroll, Fake Checks & Hour Overages Copyright © 2013 FraudResourceNet™ LLC
  • 3. Webinar Housekeeping This webinar and its material are the property of FraudResourceNet LLC. Unauthorized usage or recording of this webinar or any of its material is strictly forbidden. We will be recording the webinar and you will be provided access to that recording within five business days after the webinar. Downloading or otherwise duplicating the webinar recording is expressly prohibited. Please complete the evaluation to help us continuously improve our Webinars. You must answer the polling questions to qualify for CPE per NASBA. Submit questions via the chat box on your screen and we will answer them either during or at the conclusion. If GTW stops working you may need to close and restart. You can always dial in and listen and follow along with the handout. Copyright © 2013 FraudResourceNet™ LLC Learning Objectives       Costliest Forms of Internal & External Payroll Fraud Who Commits Payroll Fraud Gathering Accurate Data for Effective Data Analysis Powerful and User-Friendly Audit Automation Tests Techniques for Detecting Red Flags of Payroll Frauds Data Analytics Results & Improving Preventative Controls for Payroll Copyright © 2013 FraudResourceNet™ LLC 5
  • 4. Agenda           Introduction Standards & Essentials Fraud State of the Union In the News: Costliest Forms of Payroll Fraud Payroll Fraudsters Planning for Payroll Fraud Data Gathering for Payroll Data Analysis Data Analysis & Payroll Fraud Red Flag Detection & Payroll Fraud Using Data Analysis Results to Improve Controls Copyright © 2013 FraudResourceNet™ LLC 6 The Auditor’s Role  IPPF Standard 1210.A3  Internal auditors must have sufficient knowledge of…available technology based audit techniques to perform their assigned work Copyright © 2013 FraudResourceNet™ LLC
  • 5. IIA Guidance – GTAG 13 Internal auditors require appropriate skills and should use available technological tools to help them maintain a successful fraud management program that covers prevention, detection, and investigation. As such, all audit professionals — not just IT audit specialists — are expected to be increasingly proficient in areas such as data analysis and the use of technology to help them meet the demands of the job. Copyright © 2013 FraudResourceNet™ LLC Professional Guidance Copyright © 2013 FraudResourceNet™ LLC
  • 6. Fraud State of the Union 2012 ACFE Report to the Nations Copyright © 2013 FraudResourceNet™ LLC Fraud State of the Union 2012 ACFE Report to the Nations Copyright © 2013 FraudResourceNet™ LLC
  • 7. In the News: Costliest Forms of Payroll Fraud According to ACFE's "Report to the Nation on Occupational Fraud and Abuse":  > 39% of Fraud Cases in Payroll Occur in Business with < 99 Employees  Payroll Fraud Accounts for Nearly 10 percent e.g. $60 Billion Annually  Small Businesses Losses Average $127,500 per Scheme.  Large Company Losses Average $97,000 per Scheme. Ranked from Most to Least Costly Occurrence Ghost Employees Commission Schemes Workman’s Compensation Falsified Wages Average Per $100,000 - $300,000 $100,000+ $100,000+ $50,000+ Copyright © 2013 FraudResourceNet™ LLC Polling Question 1 The median loss in 2012 for owners/managers in fraud cases was _______. a. $182,000 b. $573,000 c. $60,000 Copyright © 2013 FraudResourceNet™ LLC
  • 8. In the News: Case of Being Asleep at the Wheel in the City That Never Sleeps Mayor Says Payroll Fraud “Slipped Through the Cracks”  Joel Bondy, Head of NYC Payroll hired Mark Mazer, a “quality assurance” consultant and gave him authority and budget to hire subcontractors.  Mazer awarded “subcontract” of $55 million to a company owned by his uncle… one for $20 million to a friend … one worth $1.4 million to another friend.  Each “ghost subcontractor” kicked back 1/3 to Mazer thru shell companies owned by his wife and his mother. Total cost to NYC payroll budget: $80 million Copyright © 2013 FraudResourceNet™ LLC Payroll Fraudsters: Perpetrators Copyright © 2013 FraudResourceNet™ LLC
  • 9. Payroll Fraudsters: Perpetrators Copyright © 2013 FraudResourceNet™ LLC Polling Question 2 The duration of payroll incidents in 2012 was... a. b. c. d. 24 months 18 months 36 months 12 months Copyright © 2013 FraudResourceNet™ LLC
  • 10. Data Gathering for Payroll Data Analysis  Request All Meta Data Fields  Name  Employee ID  Address  Rate of Pay  Commission  History for X Time Period  Additions & Changes to Status  Changes to Fields & Who Made Them Copyright © 2013 FraudResourceNet™ LLC Auditing for Payroll Fraud  Request Access Listing & Last Activity from IT  Provide Employee Listing from Payroll & 100% Alignment with Access        Cross Reference IT to Active Employees Paid (Join) Review Employees with High Withholding Exemptions Review Employees with Low (or no) Tax Withholdings Request Data of Employees with No Voluntary Deductions Request a No-PTO-Used Report for Employees Request a Listing of Employees with No Changes > 6 Months Request a Listing of Employee & Deposit Accounts (Dups) Any Red Flags Could Equal a Problem! Copyright © 2013 FraudResourceNet™ LLC
  • 11. Red Flags of Payroll Fraud  Allowances/Garnishments to Disallowed Positions   Overtime for Salaried Employees Meal allowances to Unqualified Employees  Employees on the payroll that do not appear on the:      Phone listings, Human Resources employee listing etc Same Bank Account Numbers for Two Employees Excessive Overtime Excessive Commissions “Earned” Gross pay = Net Pay (no deductions) Continued… Copyright © 2013 FraudResourceNet™ LLC Red Flags for Payroll Fraud (continued)         Duplicate Payments & Time Modified Time by Other Employees Employees with No Vacation Time Paid Employees Paid with Non-Standard Checks Two employees with Same Social Security # Same address for 2+ Employees Oddly-timed Pay Increases Ex-employees with Paychecks Copyright © 2013 FraudResourceNet™ LLC
  • 12. Behavioral Red Flags       Unexplained Wealth Sudden Unusual Mood Swings Financial Problems e.g. Credit card or other debt Family problems e.g. divorce, child access issues Gambling Problems Addiction to Drugs / Alcohol Copyright © 2013 FraudResourceNet™ LLC Polling Question 3 What Additional Items Should Be Requested Beyond Meta Data Standard Fields? a. b. c. d. Access & Activity Listing from IT Employees with All Changes Neither of the Above Both a and b Copyright © 2013 FraudResourceNet™ LLC
  • 13. Top 10 Areas for Data Analysis 1) Accounts Payable & Accounts Receivable  Purchasing to Payment Analysis  Review of Operating Disbursements  Validation of Payments to Vendors  Analyzing AR Open Orders for Process Deficiencies  Evaluating AR Aging for Internal and External Financial Reporting  AR Testing and Searching for Duplicate Payments 2) Duplicate Detection (Payroll)  Fraud, Errors, Anomalies, or Outliers  Payments, Invoices, Transactions, Credits Results from Survey Conducted by Audimation Services, Inc. in 2011 Copyright © 2013 FraudResourceNet™ LLC Top 10 Areas for Data Analysis cont. 3) Sampling  Ability to Test 100%  Adequate Representation  Scope Setting 4) Data Imports/Extracts & Analysis of Large Data Sets     Text PDF Excel Word 5) Continuous Auditing & Monitoring     Financial Statements & Areas Travel & Entertainment Disbursements(Payroll) Human Resources Results from Survey Conducted by Audimation Services, Inc. in 2011 Copyright © 2013 FraudResourceNet™ LLC
  • 14. Polling Question 4 Which of the following could be red flags of payroll fraud (choose all that apply) 1. 2. 3. 4. 5. Different Bank Accounts No Overtime for Salaried Employees Overtime for Salaried Employees Gross Pay = Net Pay Terminated employees receiving paychecks Copyright © 2013 FraudResourceNet™ LLC Top 10 Areas for Data Analysis cont. 6) Fraud Detection & Forensics  Red Flags & Discovery (Payroll) 7) Analysis of P - Cards Reviewing Internal Controls Process Determination Fraud Detection 8) Payroll & Time Sheets (Payroll) Ghost Employees Falsified Wage Sheets & Time Cards Weekly / Monthly Reasonableness Compliance Review e.g. Approvals Results from Survey Conducted by Audimation Services, Inc. in 2011 Copyright © 2013 FraudResourceNet™ LLC
  • 15. Top 10 Areas for Data Analysis cont. 9) Joins & Comparisons  Active Application Users vs. List of Terminated Employees  Physician Scheduling System to the Billing System  Vendor Terms including Early Payments & Aging  Tax ID numbers and Conflict of Interest  Review of Billing & Pricing vs. Contracts  Missing Invoice Numbers  Employee to Vendor Address 10) Inventory  Obsolescence  Slow Moving  Reconciliations Results from Survey Conducted by Audimation Services, Inc. in 2011 Copyright © 2013 FraudResourceNet™ LLC Using Data Analysis to Improve Controls  Don’t Simply React to Findings  Determine What is Not Happening  Improve the Environment Copyright © 2013 FraudResourceNet™ LLC
  • 16. Payroll Control Improvement Prevention of Unauthorized Raises  Segregation of Duties for Preparation, Disbursement, and Distribution.  Restrict Access to the Software & Keep Passwords Safe  Have Removed Approver for Payroll  Compare Wages Approved vs. Paid Quarterly  Review Budget v. Actual Monthly. Prevention of Creation of Ghost Employees  Do all Employees Have Deductions?  Do All Match IT Access Listing?  Implement Controls That Don’t Allow Addition of Payroll Without Confirmed IT Access Copyright © 2013 FraudResourceNet™ LLC Preventing Payroll Fraud Ghost Employees  Conduct periodic payroll audits in which all employees must physically sign  Review payroll for duplicate addresses or Social Security numbers. (Sample)  Investigate all returned W-2 forms.  Verify Social Security numbers with Social Security Administration.  Randomly review payroll database for employees with P.O. boxes or No Deductions  Require direct mailing of checks or have management distribute them physically Types: Terminated, Fake, No Show, Temporary, Rehire, and Pre-employment Ghost Copyright © 2013 FraudResourceNet™ LLC
  • 17. Preventing Payroll Fraud Worker’s Compensation     Maintain cameras in your workplace to capture accidents. Require that injuries are reported promptly. Receive concurring medical opinions for certain injuries. Consider retaining private investigators to monitor employee actions. Falsified Wages        Sophisticated time clocks or systems that require a unique employee pass code. Require manager or supervisor approval of all timecards or timesheets, including overtime. Executive approval of all bonus-type compensation. Mandatory vacations for at risk employees. Executive approval of all paychecks. The ability to modify wage rates, add employees are restricted. These individuals should have their records periodically reviewed. Copyright © 2013 FraudResourceNet™ LLC Preventing Payroll Fraud Commission Schemes  Periodically review your commission structure for needed changes aligned to business?  Are you recovering commissions overpaid to employees or paid for cancelled sales?  Review financial correlations. Are sales commissions increasing when sales are dropping?  Closely audit some of your top performers. Are commissions justified?  Re-perform commission pay-outs (Sample) Copyright © 2013 FraudResourceNet™ LLC
  • 18. Polling Question 5 Obtaining concurring medical opinions for employee injuries is key to auditing for... a. b. c. d. Ghost employee schemes Commission schemes Worker’s comp fraud None of the above Copyright © 2013 FraudResourceNet™ LLC Questions?  Any Questions? Don’t be Shy! Copyright © 2013 FraudResourceNet™ LLC
  • 19. Thank You! Website: http://www.fraudresourcenet.com Jim Kaplan FraudResourceNet™ 800-385-1625 jkaplan@fraudresourcenet.com Peter Goldmann FraudResourceNet™ 800-440-2261 pgoldmann@fraudresourcenet.com Katrina Kiselinchev Inclusivitie, LLC 832-236-4778 katrina@inclusivitie.com http://www.inclusivitie.com Copyright © 2013 FraudResourceNet™ LLC