Professional Documents
Culture Documents
1. Fraudulent Statements
-
Example: Misstating the cash account balance to cover the theft of cash is not
financial statement fraud. On the other hand, understating liabilities to present a
more favorable financial picture of the organization to drive up stock prices does fall
under this classification.
Underlying problems:
1. Lack of auditor independence.
2. Lack of director independence.
3. Questionable executive compensation schemes.
Ex. Abuse of share-based compensation. Excessive use of short-term
stock options to compensate directors and executives may result in shortterm thinking and strategies aimed at driving up stock prices at the expense
of the firms long-term health.
4. Inappropriate accounting practices
2.
Corruption
-
b. Illegal gratuities
involves giving, offering, soliciting something of
value because of an official act that has been taken.
Ex. The plant manager in a large corporation uses his influence to
ensure that a request for proposals is written in such a way that only one
contractor will be able to submit a satisfactory bid. As a result, the
favored contractors proposal is accepted at a noncompetitive price. In
return, the contractor secretly makes a financial payment to the plant
manager.
c. Conflicts of Interest
occurs when an employee acts on behalf of a third
party during the discharge of his or her duties or has self-interest in the
activity being performed.
Ex. a purchasing agent for a building contractor is also part owner in a
plumbing supply company. The agent has sole discretion in selecting
vendors for the plumbing supplies needed for buildings under contract.
The agent directs a disproportionate number of purchase orders to his
company, which charges above-market prices for its products.
d. Economic Extortion
is the use (or threat) of force (including economic
sanctions) by an individual or organization to obtain something of value.
Ex. a contract procurement agent for a state government threatens to
blacklist a highway contractor if he does not make a financial payment to
the agent. If the contractor fails to cooperate, the blacklisting will
effectively eliminate him from consideration for future work. Faced with a
threat of economic loss, the contractor makes the payment.
3.
-
Asset Misappropriation
the most common fraud schemes involve some form of asset
misappropriation in which assets are either directly or indirectly
diverted to the perpetrators benefit.
examples: skimming, cash larceny, billing schemes, check
tampering, payroll fraud, expense reimbursements, theft of cash
and non-cash misappropriations.
a. Skimming
stealing cash from an organization before it is
recorded on the organizations books and records.
b. Cash Larceny (ex. Lapping)
cash receipts are stolen from an organization after
they have been recorded in the organizations books.
c. Billing schemes (known as Vendor Fraud)
perpetrated by employees who cause their employer
to issue a payment to a false supplier or vendor by submitting invoices for
Shell company
establish false supplier on the books of the victim.
there is no legitimate transaction but the system recorded
it as legitimate.
Pass-through
same with the shell company but the transaction actually
took place.
the false vendor actually purchases from a legitimate
vendor.
the false vendor charges the victim company a much
higher than market price for the items, but pays only the market
price to the legitimate vendor.
Pay-and-Return
this typically involves a clerk with check writing authority
who pays a vendor twice for the same products received. The
vendor, recognizing that its customer made a double payment,
issues a reimbursement to the victim company, which the clerk
intercepts and cashes.
d. Check Tampering
involves forging or changing in some material way a
check that the organization has written to a legitimate payee.
e. Payroll Fraud
is the distribution of fraudulent paychecks to existent
and/or nonexistent employees.
f. Expense Reimbursements
an employee makes a claim for reimbursement of
fictitious or inflated business expenses.
g. Thefts of Cash
h. Non-Cash Misappropriations
COMPUTER FRAUD
1. The theft, misuse or misappropriation of assets by altering computerreadable records and files
2. The theft, misuse or misappropriation of assets by altering the logic of
computer software.
3. The theft or illegal use of computer-readable information
4. The theft, corruption illegal copying or intentional destruction of
computer software.
5. The theft, misuse or misappropriation of computer software.
Hacking breaking into the system rather than the theft of assets.
Program Fraud
1. Creating illegal programs that can access data files to alter, delete, or insert
values into accounting records.
2. Destroying or corrupting a programs logic using a computer virus.
3. Altering program logic to cause the application to process data incorrectly.
Operations Fraud
misuse or theft of the firms computer resources.
involves using the computer to conduct personal business
Database Management
-
Characteristics:
1. Relevance
2. Timeliness
3. Accuracy
4. Completeness
5. Summarization
Fraud:
Scavenging searching through the trash cans of the computer center for
discarded output.
Eavesdropping listening to output transmissions over telecommunications
lines.
If the auditor has determined that fraud exist and had no material
effect to the financial statements:
1. Refer the matter to an appropriate level of management at least one
level above those involved.
2. Be satisfied that implications for other aspects of the audit have been
adequately considered.
When the fraud had a material effect to the financial statements or the
auditor is unable to evaluate the degree of materiality, the auditor
should:
1. Consider the implications for other aspects of the audit
2. Discuss the matter with the senior management and with board of
directors audit committee
3. Attempt to determine whether the fraud is material
4. Suggest that the client consult with the legal counsel, if appropriate.
Documentation Requirements
1. Risk factors identified
2. The auditors Response to them
FRAUD TECHNIQUES
Payments to Fictitious Vendors
1. Sequential invoice numbers
2. Vendors with P.O. Boxes
3. Vendors with Employee Addresses
4. Multiple Companies with the same address
5. Invoice amounts slightly below the review threshold
Payroll Fraud
1. Test of Excessive Hours Worked
2. Test for duplicate payments
3. Test for Nonexistent employees
Lapping of Accounts Receivable
Use ACLs expression builder to select items from each file version whose
Remittance Amount field is greater than zero and less than the Invoice Amount field.
These sets of records may contain legitimate items that are being disputed by the
customers. For example, damaged goods, overcharges, and refused deliveries may
result in customers making only partial payments. The auditor will need to sift
through these legitimate issues to identify lapping.
Merge the resulting carry-forward files into a single file reflecting activity for the
entire period.
Create a calculated field of the amount carried forward (Invoice Amount
Remittance Amount).
Use the duplicates command to search the file for calculated carry-forward
amounts that are the same.