810 likes | 870 Views
This insightful presentation by Mark Dauberman, CPA, EMBA explores the critical role of internal controls in detecting and preventing fraud. Learn about various fraud types like misappropriation of assets, financial statement fraud, and corruption schemes. Discover real-life examples of fraud cases and explore methodologies for fraud detection and prevention. Gain valuable insights on how to safeguard your organization against internal threats and maintain financial integrity.
E N D
Internal Controls THE ROLE OF INTERNAL CONTROLS IN THE PREVENTION AND DETECTION OF FRAUD Presented by Mark Dauberman, CPA, EMBA
“Fraud Is Committed by Desperate Individuals” Joseph T Wells, CPA, CFE Founder & Chairman of ACFE
How Fraud is Committed – The Nature of Fraud • Misappropriation of assets • Financial statement fraud • Corruption schemes
Misappropriation of Assets • Theft of cash • Theft of cash on hand • Theft of cash receipts • Fraudulent disbursements • Misappropriation of inventory and other assets • Larceny • Misuse
Theft of Cash Receipts • Larceny • Skimming • Sales • Receivables • Refunds and other
Fraudulent Disbursements • Billing schemes • Payroll schemes • Expense reimbursement schemes • Check tampering • Register disbursements
Financial Statement Fraud • Overstatements of net income and net worth • Understatements of net income and net worth
Overstatements of Net Income and Net Worth • Timing differences • Fictitious revenues • Concealed liabilities and expenses • Improper asset valuations • Improper disclosures
Understatements of Net Income and Net Worth • Timing differences • Understated revenues • Overstated liabilities and expenses • Improper asset valuations • Improper disclosures
Corruption Schemes • Conflicts of interest • Bribery • Illegal gratuities • Economic extortion
Examples • A T & T – Misuse of Assets • Foster Foods – Expense reimbursement scheme • Agassiz – Check tampering • A Major National Superstore – Inventory theft
A T & T – Misuse of Assets – The Headlines May 9, 2013 – AT&T Pays FCC $18.25 Million to Settle IP Relay Fraud Claims November 7, 2013 – AT & T Pays Another $3.5 Million to Settle IP Relay Fraud Claims
The Fraud • Overbilled U.S. Government Fund intended to help hearing and speech impaired customers • - 80% of calls billed were ineligible • - “It was common knowledge among AT&T communication assistants that many callers were from Nigeria and other foreign countries and that these callers used the system to defraud U.S. merchants by ordering goods with stolen credit cards and counterfeit checks.”
What Was (Were) the Fraud(s)? • Overbilling • Did AT & T know? • Should they have known? • If so, is ignorance fraud? • Allowing fraudulent use of service • Should employees have blown the whistle? • Should AT & T have known? • Is AT & T responsible?
Detection • Who should be able to detect? • Management • Overbilled agency • How would it be detected? • Knowledge • Converted into expectations
Prevention • Who committed the fraud? • Communication assistants • Knew of fraud • Should not have allowed • Management
Prevention • How to prevent: • Take away the reason • Take away the opportunity • Take away the ability to rationalize
Case 2Expense Reimbursement • “When Petty Cash Isn’t Petty” • Fraud Casebook – Lessons from the Bad Side of Business • Edited by Joseph T. Wells, ACFE, Published by Wiley • Chapter 21, Karen Frey, PhD, CPA
The CompanyFoster Foods • Founded in 1953 by brothers Arthur & Louis • Very successful selling jam made from family farm’s unsold fruit • Changed strategy to research and development of dried fruit products • Grew and transformed too rapidly and filed for Chapter 11 protection • Used petty cash for expenditures as vendors were not accepting company checks or credit
The PerpetratorJeri Hansen • Responsible for petty cash accounting and reconciliation and accounts payable • 15-year employee with positive reputation • Insisted on complete and accurate documentation • Anticipated and fulfilled officer’s information needs • Understood and provided types of documents and summaries needed by auditors • “It would be a lot easier if I just get that for you” • Rarely took time off
System ExploitedPetty Cash Payments • Cash for estimated expenses given to drivers before trips • Receipts and remaining cash returned by drivers after trip • Voucher with receipts attached and remaining cash placed in petty cash drawer • Cash reimbursed when low or drawer full of vouchers • Jeri prepared reimbursement envelope with petty cash vouchers inside and summary on outside stating total reimbursement, payees, dates paid, and accounting distribution • Controller reviewed contents and approved reimbursement • Treasurer provided reimbursement check to Jeri to cash at the bank
The FraudMethodology • Invoices paid both by check and through petty cash • Incorrect totals on vouchers • Incorrect amounts transferred from vouchers to summary • Receipts duplicated and submitted more than once • Photocopies of receipts submitted as originals • Amounts on receipts altered • Vouchers issued without supporting receipts • Payments made for credits or where invoice indicated that no amount was due • Original and “corrected” invoices submitted for payment
Discovery • CFO seeking information during Jeri’s vacation • Not suspicious, but noticed petty cash disbursement to supplier normally paid by check • Initiated investigation • Repercussions • Losses of $100,000 uncovered • Jeri convicted • Restitution ordered and partially paid • Required to serve part of 24-month sentence in county jail
Lessons Learned • Segregation of duties • Supervision • Control activities • Ensure that reimbursement procedures are followed • Review analysis of fuel consumption
Case 3Check Tampering • “A Taxing Problem” • Fraud Casebook – Lessons from the Bad Side of Business • Edited by Joseph T. Wells, ACFE, Published by Wiley • Chapter 11, Andrew Kautz, CFE
The CompanyAgassiz • Midsize construction company involved in road and commercial building construction • Family-type work environment with employees trusted and participating in success of company • Expanded over years without making investment in internal controls • Weak in accounting • Lack of segregation • Responsibility without oversight
The PerpetratorAngela Bauer • No high school diploma but GED and a few community college bookkeeping and business courses • Willing to work, charming, and appeared to be capable and loyal employee • Worked for company for more than 10 years • Moved up from clerk to accounts payable • Responsible for payments to vendors • No check-signing authority • Also responsible for bank reconciliation
The Fraud Tax Payments • Prepared check requests for tax payments • Altered payee to be negotiable to Angela Bauer or her husband • Some checks written to bank credited to Bauer’s benefit
Discovery • After Angela had left company, government auditor performing normal review of books • Identified two checks to agency, knew agency had only received one • Found cancelled check written to bank instead of government • Initiated investigation • Repercussions • Losses of $570,000 uncovered • Angela liable for full amount of fraud and husband liable for portion
Lessons Learned • Segregation of duties • Angela responsible for both issuing checks and reconciling bank account so she could perpetrate fraud and cover tracks • Control activities • Reassess controls on a regular basis • Trust employees, but create basic safeguards
Case 4Inventory • “Price Check on Register One” • Fraud Casebook – Lessons from the Bad Side of Business • Edited by Joseph T. Wells, ACFE, Published by Wiley • Chapter 27, Dwight Taylor, CFE, DRE
The CompanyMajor National Superstore • Very control conscious • State-of-the-art surveillance system
The PerpetratorsHolly Harmon • Married woman unable to make ends meet living in small town in Iowa • Moved with husband to Des Moines for higher paying jobs • Lacked specialized skills and had criminal record • Obtained job as cashier at large national superstore
The PerpetratorsFamily & Friends • Clifton Harmon, husband • Shelly North, Holly’s sister • Divorced with 3 children • Unable to work, dependent on government assistance • Cathy Lester, one of Holly’s best friends • Divorced with 2 children • Working as office assistant and unable to make ends meet • Amelia Leach, Holly’s friend • Arrested for forgery at age 20 • In and out of jail and marriage
The FraudCash Register Receipt Theft • Placed UPC codes for inexpensive items on more expensive merchandise • Rang up merchandise at lower amounts on sales to accomplices • Refunded items without return of merchandise • Sold suitcases and other bags and containers full of merchandise
Discovery • After Holly left company, manager performed routine review of activity of former employee • Video tapes showed sales of items that did not appear on cash register tapes • Video showed customer being allowed to retain merchandise after transaction was voided • Initiated investigation upon reviewing tapes • Clifton confessed upon interview • Holly and Amelia received 10-year prison sentences and were ordered to pay restitution • Approximately $12,000 in merchandise recovered
Lessons Learned • Background checks • Should be routine for employees handling valuables such as cash or merchandise • Would prevent hiring of people like Holly who have criminal records • Control activities • Create system that flags unusual activity such as a large number of voided transactions • Perform regular, random reviews of cash register logs • Make employees aware of monitoring as a deterrent
Identifying Control DeficienciesUnderstand Existing Core Systems • Initiation • Authorization • Execution • Recording • Verification
Identifying Control DeficienciesDocument Understanding of Existing Core Systems • Documentation • Narrative • Flow of Transactions, Verified Throughout • Flow Charts • Documentation & Segregation of Duties
Identifying Control DeficienciesIdentify Control Activities • Identify accounts affected by system • Evaluate actions within system • Determine control activity when action supports assertion • Indicate assertion supported
Identifying Control DeficienciesEvaluate Control Deficiencies • Review control activities by assertion • What could go wrong? • Type of issue • Component of process • Applicable assertion • Nature of issue • Error • Fraud
Identifying Control DeficienciesDetermine Appropriate Risk Response • Basis for decision • Likelihood of loss • Magnitude of loss • Alternative responses • Acceptance • Rejection • Sharing • Mitigation
Limitations of Internal Controls • Design • Implementation • Subject Matter
Develop Preventive Internal ControlsCreate Management Reports • Create management reports that identify signs of possible fraud • Abnormal relationships among accounts • Sales & accounts receivable • Sales & cost of sales • Cost of sales & inventory • Inventory & accounts payable • Interest & average debt • Accrued or prepaid expenses & monthly “burn” • Anomalies or pattern changes • Customer performance • Employee behavior
Develop Preventive Internal ControlsControls with Potential to Prevent Fraud • Conventional controls • Performance indicators • Information processing controls • Physical controls • Segregation of duties • “Holistic” controls • Acceptance of reality • Universal involvement • Rewards over punishment
Understanding Internal Control • COSO Framework
Internal Control Components, Principles, and Factors • Control Environment • Standards, processes, and structures providing basis for carrying out internal control • Established by board of directors and management • Importance of internal controls • Expected standards of conduct • Integrity and ethical values of organization • Organizational structure and assignment of authority and responsibility • Process for attracting, developing, and retaining competent individuals • Accountability for performance
Principles Related to the Control Environment • - The organization demonstrates commitment to integrity and ethical values • - The board of directors demonstrates independence from management and exercises oversight of the development and performance of internal control. • - Management establishes, with board oversight, structures, reporting lines, and appropriate authorities and responsibilities in the pursuit of objectives. • - The organization demonstrates a commitment to attract, develop, and retain competent individuals in alignment with objectives. • - The organization holds individuals accountable for their internal control responsibilities in the pursuit of objectives.
Factors indicating that the organization demonstrates commitment to integrity and ethical values • - Sets the tone at the top – The board of directors and management at all levels of the entity demonstrate through their directives, actions, and behavior the importance of integrity and ethical values to support the functioning of the system of internal control. • - Establishes Standards of Conduct—The expectations of the board of directors and senior management concerning integrity and ethical values are defined in the entity's standards of conduct and understood at all levels of the organization and by outsourced service providers and business partners. • - Evaluates Adherence to Standards of Conduct—Processes are in place to evaluate the performance of individuals and teams against the entity's expected standards of conduct. competent individuals in alignment with objectives. • - Addresses Deviations in a Timely Manner—Deviations from the entity's expected standards of conduct are identified and remedied in a timely and consistent manner..