Fraud prevention, detection and investigation in the payday advance industry was discussed including defining fraud and embezzlement, how they occur in the industry, and steps that can be taken to prevent fraud such as implementing policies to segregate duties and conduct regular audits. Common types of fraud like internal and external fraud were described as well as ways fraud can be detected through analytical procedures and interviews. The roles of forensic accountants and methods of investigating probable fraud cases were also outlined.
The slides provides fundamental understanding of concepts, principles and issues in fraud risk management. It is a comprehensive summary of general knowledge and understanding about the fraud risk management.
Most companies have ethics and compliance policies in place and those policies usually include training for employees. That training typically includes material about policies prohibiting discrimination and harassment, bribery and excessive gift-giving. But it usually does not teach employees how to recognize signs of fraud and how to report them.
Employee fraud awareness training is one of the most important ways your company can protect itself from fraud which, according to the Association of Certified Fraud Examiners, costs the average company five per cent of its revenues every year.
The presentation provides overall insight of operational fraud risk management. It explains the operational fraud risk and mitigation strategies. The role of Internal audit and audit committee is further exemplified
On December 5, 2013, Ron Steinkamp, principal, government advisory services at Brown Smith Wallace, presented at the 2013 MIS Training Institute Governance, Risk & Compliance Conference. Ron focused on the following keys to fraud prevention, detection and reporting:
1. Anti-fraud culture
2. Fraud policy
3. Fraud awareness/training
4. Hotline
5. Assess fraud risks
6. Review/investigation
7. Improved controls
A review of common fraud areas that occur in closely held businesses, how to prevent them and what your legal remedies are if you are a victim of fraud.
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
Forensic accountants use many tools to fine tune their fraud investigation process, yielding useable results during any fraud investigation. Learn more here.
The process of paying close and continuous attention "wakefulness and watchfulness make a good hunter"; "vigilance is especially subject to fatigue"
we keep an eye open for all the fatigue.
Detecting and investigating vendor fraud mvwCase IQ
Vendor fraud schemes cost organizations in the US millions of dollars each year and no company is immune. Knowing what to look for and where to look is crucial to preventing, detecting and stopping this expensive fraud.
Join Maribeth Vander Weele, investigation expert, former inspector general and founder of the Vander Weele Group; as she presents case studies, practical examples, and discussion to outline strategies for detecting and investigating vendor fraud.
The slides provides fundamental understanding of concepts, principles and issues in fraud risk management. It is a comprehensive summary of general knowledge and understanding about the fraud risk management.
Most companies have ethics and compliance policies in place and those policies usually include training for employees. That training typically includes material about policies prohibiting discrimination and harassment, bribery and excessive gift-giving. But it usually does not teach employees how to recognize signs of fraud and how to report them.
Employee fraud awareness training is one of the most important ways your company can protect itself from fraud which, according to the Association of Certified Fraud Examiners, costs the average company five per cent of its revenues every year.
The presentation provides overall insight of operational fraud risk management. It explains the operational fraud risk and mitigation strategies. The role of Internal audit and audit committee is further exemplified
On December 5, 2013, Ron Steinkamp, principal, government advisory services at Brown Smith Wallace, presented at the 2013 MIS Training Institute Governance, Risk & Compliance Conference. Ron focused on the following keys to fraud prevention, detection and reporting:
1. Anti-fraud culture
2. Fraud policy
3. Fraud awareness/training
4. Hotline
5. Assess fraud risks
6. Review/investigation
7. Improved controls
A review of common fraud areas that occur in closely held businesses, how to prevent them and what your legal remedies are if you are a victim of fraud.
Essentials of a Highly Effective Employee Fraud Awareness ProgramFraudBusters
Webinar series from FraudResourceNet LLC on Preventing and Detecting Fraud in a High Crime Climate. Recordings of these Webinars are available for purchase from our Website fraudresourcenet.com
This Webinar focused on the subject in the title
FraudResourceNet (FRN) is the only searchable portal of practical, expert fraud prevention, detection and audit information on the Web.
FRN combines the high quality, authoritative anti-fraud and audit content from the leading providers, AuditNet ® LLC and White-Collar Crime 101 LLC/FraudAware.
Forensic accountants use many tools to fine tune their fraud investigation process, yielding useable results during any fraud investigation. Learn more here.
The process of paying close and continuous attention "wakefulness and watchfulness make a good hunter"; "vigilance is especially subject to fatigue"
we keep an eye open for all the fatigue.
Detecting and investigating vendor fraud mvwCase IQ
Vendor fraud schemes cost organizations in the US millions of dollars each year and no company is immune. Knowing what to look for and where to look is crucial to preventing, detecting and stopping this expensive fraud.
Join Maribeth Vander Weele, investigation expert, former inspector general and founder of the Vander Weele Group; as she presents case studies, practical examples, and discussion to outline strategies for detecting and investigating vendor fraud.
The Youth Mental Health Network showcased its work to senior NHS and Social Care Leaders at the launch of the South East Strategic Clinical Network on 1st may 2013.
Overview of current vulnerability approaches and methods for the Global Climate Adaptation Partnership's Adaptation Academy. Tom Downing (based on a decade of work on vulnerability indicators). March 2011
FASB Proposals Affecting Government ContractorsDecosimoCPAs
Robert Belcher and Ken Conner co-presented this PowerPoint at the 2012 RocketCity GovCon Conference hosted by Solvability in Huntsville, Ala. on Sept. 20, 2012.
The Mental Health Network represents providers from across the statutory and non-statutory sectors.
The network works with government, regulators, opinion formers, media and the wider NHS to promote excellence in mental health services, and the importance of good mental health.
You can find out more about the NHS Confederation Mental Health Network at www.nhsconfed.org/mhn
The Importance of Internal Controls in Fraud Prevention Rea & Associates
Presentation made by Ohio Accounting Firm, Rea & Associates, on the how strong internal controls can help Ohio companies deter fraud in the workplace. Special attention is given to the 5 components of internal controls and how to diffuse the traingle of fraud.
Combating Fraud : Putting in Place an Effective Audit System to Detect and Pr...Pairat Srivilairit
Combating Fraud : Putting in Place an Effective Audit System to Detect and Prevent Fraud
The 9th - Cyber Defense Initiative Conference 2009 - (CDIC 2009)
10th-11th November 2009 Queen Sirikit National Convention Center
By Pairat Srivilairit, CIA, CISA, CBA, CCSA, CFSA, CISSP, CFE
Tuesday, 10 November 2009 15:15-16:00 hrs
Combating Fraud: Putting in Place an Effective Audit System to Detect and Prevent Fraud (45 min)
Key Indicators of Fraud
Types of Fraud in Activities Reviewed
Prevention Aids by Internal Auditors
Detection and Investigation Techniques
Summary
Occupational Fraud - What Dentists Need to Knowgppcpa
This presentation covers the definition of occupational fraud, the risk factors, the fraud triangle, how motive, opportunity and rationalization all play into fraud, what to do when fraud is detected, and actionable anti-fraud steps.
Fooling the auditor - Understand the People RiskJenny Reid
Understand the people risk in your organisatiton and realise how people can fool the auditor. Audits are reactive. Learn to take proactive steps in fraud prevention.
Insider Threat: Cases and Controls to Prevent Internal Fraud and PreventionCase IQ
“I never would have imagined”, said the company owner, manager, colleague, or workplace friend. It is hard to reconcile that people would engage in fraudulent behavior in the workplace, let alone the depth of these schemes. Financial misconduct and internal fraud are among the biggest threats to today’s organizations. Without the right controls and prevention measures in place, companies are at financial and reputational risk.
Join financial crime compliance advisory and training specialist Michael Schidlow, as he reviews recent cases of internal fraud, what we can learn from them, and controls that companies can put in place to prevent fraud
Forensics and Fraud: Red Flags and War StoriesDecosimoCPAs
Principal Mike Costello, CPA•ABV•CFF, ASA, CFE, Director of Litigation Support Sharon P. Hamrick, CPA•CFF, CFE and Senior Manager Pamela S. Mantone, CPA•CFF, CFE, FCPA, CITP, CGMA co-presented the topic "Forensics and Fraud: Red Flags and War Stories" at the 2013 TSCPA FSV Conference, during which they shared from their experiences the details of various fraud schemes and methods used to detect and investigate them. - See more at: http://decosimo.com/www/announcements/540.8136/forensic-accounting-fraud-specialists-share-expertise-tscpa#sthash.eEdR6hfE.dpuf
Assurance Principal Jennifer Goodman presented "What Was the FASB Thinking?," a discussion and examples of unusual accounting rules, at the 2013 Decosimo Accounting Forum hosted by the University of North Alabama on July 19.
Principal in Charge of Assurance Department at Decosimo Tom Eiseman presented "Back to the Future Part I & II - Plans for Private Company Reporting" at the 2013 Decosimo Accounting Forum hosted by the University of North Alabama on July 19.
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
The world of search engine optimization (SEO) is buzzing with discussions after Google confirmed that around 2,500 leaked internal documents related to its Search feature are indeed authentic. The revelation has sparked significant concerns within the SEO community. The leaked documents were initially reported by SEO experts Rand Fishkin and Mike King, igniting widespread analysis and discourse. For More Info:- https://news.arihantwebtech.com/search-disrupted-googles-leaked-documents-rock-the-seo-world/
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
As a business owner in Delaware, staying on top of your tax obligations is paramount, especially with the annual deadline for Delaware Franchise Tax looming on March 1. One such obligation is the annual Delaware Franchise Tax, which serves as a crucial requirement for maintaining your company’s legal standing within the state. While the prospect of handling tax matters may seem daunting, rest assured that the process can be straightforward with the right guidance. In this comprehensive guide, we’ll walk you through the steps of filing your Delaware Franchise Tax and provide insights to help you navigate the process effectively.
Putting the SPARK into Virtual Training.pptxCynthia Clay
This 60-minute webinar, sponsored by Adobe, was delivered for the Training Mag Network. It explored the five elements of SPARK: Storytelling, Purpose, Action, Relationships, and Kudos. Knowing how to tell a well-structured story is key to building long-term memory. Stating a clear purpose that doesn't take away from the discovery learning process is critical. Ensuring that people move from theory to practical application is imperative. Creating strong social learning is the key to commitment and engagement. Validating and affirming participants' comments is the way to create a positive learning environment.
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...BBPMedia1
Grote partijen zijn al een tijdje onderweg met retail media. Ondertussen worden in dit domein ook de kansen zichtbaar voor andere spelers in de markt. Maar met die kansen ontstaan ook vragen: Zelf retail media worden of erop adverteren? In welke fase van de funnel past het en hoe integreer je het in een mediaplan? Wat is nu precies het verschil met marketplaces en Programmatic ads? In dit half uur beslechten we de dilemma's en krijg je antwoorden op wanneer het voor jou tijd is om de volgende stap te zetten.
What are the main advantages of using HR recruiter services.pdfHumanResourceDimensi1
HR recruiter services offer top talents to companies according to their specific needs. They handle all recruitment tasks from job posting to onboarding and help companies concentrate on their business growth. With their expertise and years of experience, they streamline the hiring process and save time and resources for the company.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Remote sensing and monitoring are changing the mining industry for the better. These are providing innovative solutions to long-standing challenges. Those related to exploration, extraction, and overall environmental management by mining technology companies Odisha. These technologies make use of satellite imaging, aerial photography and sensors to collect data that might be inaccessible or from hazardous locations. With the use of this technology, mining operations are becoming increasingly efficient. Let us gain more insight into the key aspects associated with remote sensing and monitoring when it comes to mining.
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
Fraud Prevention, Detection and Investigation in the Payday Advance Industry
1. Fraud Prevention, Detection and
Investigation in the Payday Advance
Industry
D. Michael Costello, CPA•ABV,
CFE
2008 CFSA Annual Meeting and Conference
Las Vegas, Nevada
March 6, 2008
2. Overview
What are fraud and embezzlement?
How do fraud and embezzlement happen in the
payday advance industry?
What steps can be taken to prevent fraud and
embezzlement in our business?
How is fraud detected?
How do we investigate fraud?
3. Who is committing fraud?
Other Employees
Outsiders <$100,000
Managers <1 Year $100,000–$1 million
Managers 1+ Years >$1 million
5. Fraud and Embezzlement Defined
Fraud: a misrepresentation or false statement
knowingly made to a victim who relies on it and
incurs detriment or harm as its result to the
benefit of the perpetrator
Embezzlement: ―the fraudulent appropriation of
property by one lawfully entrusted with its
possession‖ (Black’s Law Dictionary)
6. The Nature of Fraud
Schemes are always hidden or concealed—
absence of fraud can never be absolutely proven
Courts (juries) are the final arbiter of whether or
not a fraud has occurred
Certified Fraud Examiners can only conclude
that there is an appearance of fraud
7. Categories
Means of concealment
– Lack of documents
– Creation of fake documents
Basic classes of fraud
– Internal
– External
Relation to accounting
– On-book
– Off-book
8. External Fraud
Committed by people outside the business, or by
the business itself against a third party
– Bank fraud
– Investor/securities fraud
– Health care fraud
– Defense contracting fraud
– Bankruptcy fraud
9. Internal Fraud
Committed against an entity by its own
employees, officers, or directors
– Embezzlement
– Theft of petty cash
– Misappropriation of inventory
– Payroll fraud
– Expense account schemes
10. On-book Fraud
Money is diverted from regular accounts, or the
books are manipulated
The books and records provide evidence
11. Off-book Fraud
Diverted money or assets never reach the
financial statements
Very hard to discover/prove
When evidence does turn up, intent is
convincingly established
12. Fraud in the Payday Industry—
Case Study
A remote location of a chain had a lack of oversight and
of internal controls
Manager’s authority:
– sign checks
– make computer entries
– make deposits
– keep customer records
– prepare and sign payroll checks
– receive and reconcile bank statements
What’s wrong with this picture?
13. Concentration of Duties
When one person has certain combinations of
responsibilities, he can cover his own tracks
The manager had been there several years—
ownership, to its cost, trusted him
Manager pocketed cash while entering the
payments as being made
Thus, bank and customer records differed—but
no one reconciled them
14. Other Lapses of Oversight
Bookkeeper never questioned checks being
cashed instead of deposited, commission
advances not being repaid, bad checks from the
manager not followed up on—was too busy
dealing with many locations
Management dismissed the branch’s poor
performance as ―to be expected for a small
town‖
15. Endgame
New bookkeeper quickly noticed something was
wrong
But by the time management had it checked out,
all the records had been destroyed
16. Other ―War Stories‖
Employee ―Hotline‖ used to detect fraud
Performance of ―Fraud Risk Assessment‖
procedures
Investigation of ―trusted‖ bookkeeper
17. Fraud Prevention
TEEAM
– Timely
– Effective
– Efficient
– Accurate
– Mobile
18. Timely
Especially in a cash-intensive business like
check advance, timely data is critical
Be ahead of the situation—err on the side of
overprotection
Analyze data daily to find anomalies, and act on
them immediately
– Problems are caught quickly
– The tone discourages illegal activity
19. Effective and Efficient
Use information that is relevant and correlated
with the problem
– Daily deposit totals are a critical variable
– Count of checks held v. internal or industry norms
can be useful
If data’s not relevant, don’t bother with it—
you’ll just waste time you could use on
something more important
20. Accurate
The data used must properly reflect what it
appears to
Test the accuracy of counts regularly (e. g. by
physically counting held checks)
21. Mobile
Managers should visit stores regularly
Each should have just a few stores, and should
know and closely observe those stores
22. Operating Procedures
Communicate to employees by way of a manual
Routine ―surprise‖ audits of centers
Weekly management audits of center results
Monthly full audits
– Review held checks
– Sample-test petty cash
– Verify that appropriate reports are being used
– Report to audit committee, senior managers, and (for serious issues) to the
full board of directors
– Follow up immediately
Twice/year collections audits
Employee ―Hotlines‖
23. Internal Control
Main Categories
– Financial Reporting
– Safeguarding of Assets
Five Components
– Control Environment
– Risk Assessment
– Information/Communication
– Control Activities
– Monitoring
24. Control Environment
―Tone at the top‖
Integrity/ethics
Commitment to competence
Role of board and audit committee
Philosophy and operating style
Organization structure
Assigning authority and responsibility
HR policies and procedures
25. Risk Assessment
Operating environment
Information systems
Growth of products/customers/employees
New technology
New accounting pronouncements
26. Information and Communication
Refers to all of the operations performed on
transactions and conditions to maintain
accountability for assets, liabilities, and equity
28. Monitoring
Assessment of the quality of internal control
over time
May be ongoing activities, discrete evaluations,
or a mix
29. Opportunity to Commit Fraud
Assets susceptible to misappropriation
Lack of internal control
30. Symptoms of Misappropriation
Accounting—Suspicious Analytical—Unusual
items in the records relationships/events
– Manipulated source – Odd time or place
documents – Participants who wouldn’t
– Journal entries that are normally be involved
somehow not normal – Odd policies/procedures/
– Disagreement between practices
records and physical – Excessive (or deficient)
counts (or other records) frequency
31. Fraud Detection Interviews
Conduct with all employees—not a sign of a
specific suspicion of a person
Establish rapport and get basic facts first
Then move on to the fraud-related questions
32. Questions to ask:
Do you understand the purpose of this
interview?
– Again, note this is not an accusation
Do you think fraud is a problem for business in
general?
Do you think this company has a problem with
fraud?
If employees or managers are stealing from the
company, why do you think they would do it?
33. More Questions
If you knew another employee was stealing from
the company, what would you do?
Do you know anyone that might be stealing or
taking unfair advantage of the company?
Suppose someone who worked at the company
decided to steal or commit fraud. How could he
or she do it and get away with it?
34. Even More Questions
In your opinion, who is beyond suspicion when
it comes to committing fraud at this company?
Did you ever think about stealing from the
company even though you didn’t go through
with it?
Is there any information you wish to furnish
regarding possible fraud in this company?
35. Investigation of Probable Fraud
Undercover police work
Physical/electronic surveillance
Informants
Lab analysis
Interviews
Public records checks
– County recorder’s office
– Subscription database
Checks of other databases
Analytical procedures
36. The Forensic Accountant (CFE)
After a hypothesis or allegation has been made,
the forensic accountant seeks to support or refute
it
Goals:
– Independent confirmation
– Presentation of conclusive evidence
– Determine motive, co-conspirators
– Trace funds to their final location
37. Methods of Investigation
Documents and Records of the Victim
– How the scheme was devised
– What areas were compromised/corrupted
Witness Interviews
– How it was carried out
– Why it was done
Public and Business Sources
– Can provide a variety of data
38. Financial Analysis for Fraud Detection
Horizontal analysis—trends in like items over time
Vertical analysis—relations between items of the same
set financial statements
Actual v. Budget
Compare to competitors or trade-group data
Double-entry analysis
Review G/L, journal entries
Review contracts, agreements
39. ―To Do‖ List
Implement a ―Fraud Risk Management‖ program
covering Prevention, Detection and Response
Where are you at risk for fraud?
Consider internal and external opportunities
Develop a written Plan of Ethics and Code of Business
Conduct that is communicated ―from the top‖
40. ―To Do‖ List
Basic things to implement –
– Segregate financial and accounting duties
– Duplicate sensitive tasks, such as requiring two
signatures on checks over a certain amount
– Require employees to take annual vacations
– Reconcile all bank accounts
41. ―To Do‖ List
Basic things to implement –
– Use passwords and IDs on computer files
– Restrict unauthorized access to offices and computer
– Train supervisors and managers to spot fraud, and
– Perform internal and external audits that include
fraud prevention measures