Professional Documents
Culture Documents
fraud. The general methods used to conceal inventory shrinkage are discussed in detail in the
Inventory and Other Assets section.
Ratio analysis can also provide keys to the detection of skimming schemes. These
procedures are discussed in detail in the Fraudulent Financial Statement section.
Detailed inventory control procedures can also be utilised to detect inventory shrinkage due
to unrecorded sales. Inventory detection methods include statistical sampling, trend analysis,
reviews of receiving reports and inventory records, verification of material requisition and
shipping documentation, as well as actual physical inventory counts. These procedures are
reviewed in the section on Inventory and Other Assets.
issue. However, customers who pay on invoice rather than on balance might not know the
exact balance of their account. If this is the case, it might be more effective to confirm by
invoice and reconstruct the account balance using the source documents in the files and the
results of the confirmation. If fraud is suspected, ask the customer or the bank to return a
copy of both the front and the back of the cheque(s) used to pay specific invoices. Match the
data on the cheque copies with the posting dates in the customers account.
General Controls
Sales entries and general ledger access controls should include documented policies and
procedures, which are communicated directly from management. The control procedures
will generally cover the following subjects:
Appropriate segregation of duties and access control procedures regarding who makes
ledger transactions will be followed.
Transactions must be properly recorded as to amount, date of occurrence, and ledger
account.
Proper safeguard measures will be adopted to ensure physical access to the account
systems. Additional measures should ensure the security of company assets.
Independent reconciliations as well as internal verification of accounts will be performed
on ledger accounts. 6
Skimming Controls
The discovery of thefts of cheques and cash involves proper controls on the receipt process.
Deficiencies in the answers to these typical audit-program questions may be red flags.
Is mail opened by someone independent of cashier, accounts receivable bookkeeper, or
other accounting employees who may initiate or post journal entries?
Is the delivery of unopened business mail prohibited to employees having access to the
accounting records?
6 George Georgiades, Audit Procedures (New York: Harcourt Brace Professional Publishing, 1995).
Cash Larceny
In the occupational fraud setting, a cash larceny may be defined as the intentional taking of
an employers cash (the term cash includes both currency and cheques) without the consent
and against the will of the employer.
A cash larceny scheme can take place in any circumstance in which an employee has access
to cash. Every company must deal with the receipt, deposit, and distribution of cash, so