Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
90 Cards in this Set
- Front
- Back
Discipline of Fraud Examination
|
resolving allegation of fraud from tips, complaints, or accounting clues
|
|
Methods to resolve allegations
|
documents, interviews, investigative reports, testifying, assisting in the detection of fraud
|
|
Predication
|
circumstances that would lead a reasonable person to believe fraud has occurred, is occurring or will occur
|
|
Fraud Theory Approach
|
analyze data
create hypothesis test hypothesis amend hypothesis |
|
Tools Used in Fraud Examination
|
document analysis
neutral third-party witness corroborative witnesses co-conspirators target |
|
Elements of Fraud
|
material misstatement
knowledge of the material misstatement reliance on the information damages resulting from the reliance |
|
Fraud Traingle
|
pressure
rationalization (controllable) opportunity |
|
Fraud Triangle creator
|
donald cressey
|
|
White-collar crime creator
|
edward sutherland
|
|
most often position of fraudster
|
employee
|
|
most losses of fraudster
|
executive
|
|
most likely department
|
accounting
|
|
most loss by department
|
executive
|
|
most often initial detection
|
tip
|
|
types of occupational frauds
|
corruption
asset misappropriation fraudulent statements |
|
most frequent type of fraud
|
asset misappropriation
|
|
most losses come from
|
fraudulent statements
|
|
important of skepticism
|
increases the perception of detection
|
|
professional skepticism traits (7)
|
informed
independent in mind persistant ethical perceptive effective communications question without adversary |
|
skepticism during observation (2)
|
walk throughs:
1. perpetrate 2. conceal 3. conspire 4. override lifestyle changes |
|
skepticism during document reviews (3)
|
concealment techniques
1. modification 2. duplication 3. withholding third party confirmations use of experts |
|
skepticism during interviews
|
investigate inconsistencies
signs of deception: 1. vocal clues 2. nonvocal clues 3. verbal clues |
|
types of skimming
|
sales
receivables refunds |
|
skimming
|
theft of cash prior to its entry in the accounting system
|
|
most often asset misappropriations
|
cash (most often and most loss)
|
|
most frequent & biggest losses cash misappropriations
|
fraudulent disbursements
|
|
sales skimming
|
employee makes a sale, collects the payments and makes no record of the transaction
|
|
sales skimming prevention & detection (5)
|
perception of detection
oversight presence video cameras maintain activity logs incoming mail opened in supervised area |
|
receivables skimming
|
employee records sale, collection is expected, customer is notified when sale isn't received
|
|
types of receivable skimming
|
write-off
lapping unconcealed |
|
lapping
|
using one customers payments for another
|
|
hiding receivable skimming (5)
|
force balancing
stolen statements fraudulent write-offs debiting wrong account destroying records |
|
receivables skimming prevention & detection (3)
|
improve controls (vacations, auditing)
search for accounting clues trend analysis |
|
types of cash larceny (3)
|
cash on hand
incoming receivables from the deposit |
|
cash larceny stats
|
least common and least amount of losses
|
|
cash larceny
|
theft of incoming payments that have already been recorded on the books
|
|
larceny at point of sale
|
most common point of access to ready cash--imbalance between register amount and cash drawer
|
|
ways to conceal (5)
|
theft from other register
many small thefts reversing transaction altering cash counts destroying register tapes |
|
point of sale prevention & detection (4)
|
separation of duties
independent checks cash to cashier's office run reports |
|
larceny of receivables
|
theft occurs after payment has been made resulting in an imbalance of cash
|
|
larceny from the deposit
|
individual who brings the money to the bank has an opportunity to take the deposit
|
|
deposit lapping
|
day 1 deposit is stolen and replaced by day 2 deposit
|
|
deposit in transit
|
missing money is carried as a deposit in transit but never hits the bank statement
|
|
deposit larceny prevention & detection (4)
|
separation of duties
incoming revenue to a centralized area authenticated deposit slips deposits at night drop box |
|
types of billing schemes (3)
|
shell company
non-accomplice vendor personal purchases |
|
most frequent fraudulent disbursement
|
billing
|
|
most losses for fraudulent disbursement
|
check tampering
|
|
billing schemes
|
uses false documentation to cause a payment to be issued for a fraudulent purpose
|
|
shell schemes
|
fake entity created to commit fraud
(bank account, address, number, names, etc) |
|
methods for shell schemes (5)
|
create false invoices
approve false invoice collusion purchase services pass-through schemes |
|
shell schemes prevention & detection (4)
|
regular updated approved vendor list
verify all vendors identify shell invoices test for shell schemes 1. pricing trends 2. budget overruns 3. compare vendor addresses |
|
non-accomplice vendor schemes
|
payments owed to a legitimate vendor are intercepted and stolen or fake invoice is created to real company
|
|
non-accomplice prevention & detection (3)
|
incoming check should be attached to remittance
banks shouldn't cash checks payable to organization spot check AP files |
|
personal purchases with company funds
|
personal purchases unneeded assets
|
|
methods for personal purchases through false invoices (4)
|
authorizer for invoices
falsified documents altering purchase orders created false purchase requisition |
|
personal purchase prevention & detection (4)
|
review of credit card statements
original support two copies of credit card statements monitor unexplained increases in purchases |
|
types of check tampering (4)
|
forged maker
forged endorsement altered payee concealed checks authorized maker |
|
check tampering schemes
|
perpetrator physically prepares check depending on access to checks, bank statements, cash disbursement journal or ability to forge
|
|
forge maker scheme (def & 3 requirements)
|
employee misappropriates check and affixes the signature of an authorized maker
(access to blank check, good forging, ability to conceal) |
|
forge maker prevention & detection (5)
|
safeguard checks
rules for custody segregation of duties rotate authorized signatures limit access to signature stamps |
|
forged endorsement schemes
|
employee intercepts a check intended for someone else and forges the endorsement
|
|
forged endorsement prevention & detection (7)
|
segregation of duties
training employees investigate complaints flag duplicate payments restrict ability to make vendor checks chart mailing investigate cancelled checks |
|
altered payee schemes
|
employee intercepts checks intended for third party and payee designation is altered
|
|
ability to alter
|
tack on letters
erasable ink blank checks |
|
altered payee prevention & detection (3)
|
separation of duties in check writing & reconciliation
compare canceled checks against entries use carbon copies of checks |
|
conceal check schemes
|
employee prepared fraudulent check and submits it with legitimate checks
|
|
conceal check prevention & detection (3)
|
(check signer generally is relied upon as control)
separation of duties dual signatures for disbursement up-to-date vendor list |
|
concealing check tampering (5)
|
reconcile bank statement
re-alteration of check when return from bank falsifying disbursement journal reissuing intercepted checks bogus supporting documents |
|
electric payment tampering
|
gain access to employer payment system and tamper with information
|
|
electric payment tampering prevention & detection (5)
|
separation of duties
separate bank accounts for paper and electronic transactions account monitoring bank security services |
|
bank security services (3)
|
ach blocks
positive pay restive access to software |
|
types of payroll schemes (4)
|
ghost employee
commission schemes workers compensation falsified wages |
|
payroll schemes
|
person causes organization to issue a payment by making a false claim for compensation
|
|
ghost employee
|
someone on the payroll who does not actually exist
|
|
ghost employee prevention & detection (6)
|
separate hiring and payroll
maintain personnel records verify changes to payroll check payroll against terminated employees run reports for SSN, no taxes, etc proper distribution |
|
falsified hours & salary
|
overpayment of wages by increasing hours worked or rate of pay
|
|
falsified hours & salary prevention & detection (6)
|
separation of duties
transfer of funds should be independent sick/vacation should be monitored authorize overtime verify wages no access to time cards after approval |
|
tests for detecting payroll schemes (4)
|
review people with lots of overtime
trend analysis large increase in wages should be checked compare net payroll to checks issues |
|
commission schemes
|
falsify the amount of sales make by creating false sales or overstating legitimate sales or increase rate of commission
|
|
commission schemes prevention & detection (4)
|
run reports
compare commission earned track uncollected sales random samples |
|
expense reimbursement schemes (4)
|
mischaracterized expenses
overstated expenses fictitious expenses multiple reimbursement |
|
mischaracterized expense reimbursement
|
fraudster seeks reimbursement for personal expenses
|
|
most often perpetrator?
|
high-level employees
|
|
mischaracterized expense reimbursement prevention & detection (6)
|
establish system of controls
original support documents direct review of travel expenses strict policies scrutinize expenses paid by other dept compare dates & prior years |
|
overstated expense reimbursement (3)
|
altered receipts
overpurchasing overstating another persons expenses |
|
overstated expense reimbursement prevention & detection (5)
|
original receipts
verify photocopied receipts book travel through company compare employees expenses for inconsistencies spot checks |
|
fictitious expenses (3)
|
fake receipts
black receipts from vendors claiming expenses paid by others |
|
fictitious expense prevention & detection
|
look for high dollar items
rounded of expenses same amount expenses reimbursements just below the limit over time expenses not professional looking |
|
multiple reimbursement schemes (3)
|
single expense several times
credit card receipts from corporate card same expense to different departments |
|
multiple reimbursement schemes prevention & detection
|
enforce policies
support documents look at reports approved outside the dept **reimbursement approved by direct supervisor **policy that expenses have time limit |