1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.

Slides:



Advertisements
Similar presentations
Chapter 14 Audit of the Sales and Collection Cycle
Advertisements

Secure Your Store Understand the measures used in securing a retail store.
The Expenditure Cycle: Purchasing to Cash Disbursements
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
BA 427 – Assurance and Attestation Services Lecture 4 Internal Controls: Sales and Receivables.
Cash Receipt Schemes and Other Asset Misappropriations
Chapter 2 Skimming.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
Register Disbursement Schemes
Bank Reconciliation Other Terms Review Potpourri $100100$100100$ $200200$200200$ $300300$300300$ $400400$400400$ $ Sales.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Chapter 9 Non-Cash Assets.
Chapter 3 Cash Larceny.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
Chapter 3 Cash Larceny.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Chapter 4: Cash Larceny.
Chapter 12 The Revenue Cycle: Sales to Cash Collections Copyright © 2012 Pearson Education 12-1.
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Accounting Fundamentals Dr. Yan Xiong Department of Accountancy CSU Sacramento The lecture notes are primarily based on Reimers (2003). 7/11/03.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 6 Internal Control and Financial Reporting for Cash.
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
INTERNAL CONTROLS. Session Objectives Understand why an organization should have internal controls Understand the key components of internal controls.
CHAPTER 6: INTERNAL CONTROL AND FINANCIAL REPORTING FOR CASH AND MERCHANDISE SALES LEARNING OBJECTIVE 1 Distinguish among service, merchandising, and manufacturing.
© 2014 Cengage Learning. All Rights Reserved. Do Now: ●Where do you get new shoes? ●Have you ever had to wait for a size you need to be brought out to.
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Security Issues with Vendors, Employees, and Customers Chapter 10.
COPYRIGHT © 2008 Thomson South-Western, a part of The Thomson Corporation. Thomson, the Star logo, and South-Western are trademarks used herein under license.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
Fraud, Internal Control, and Cash
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
CASH RISK ASSESSMENT. Fraud OverviewFraud SchemesWhen & How Fraud HappensOur Approach to Fraud Deterrence Overview.
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
1 Chapter 6 Merchandising Operations and Internal Control Adapted from Financial Accounting 4e by Porter and Norton.
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
Reporting and Interpreting Sales Revenue, Receivables, and Cash Chapter 6 McGraw-Hill/Irwin © 2009 The McGraw-Hill Companies, Inc.
Auditing the Revenue Process
Ensuring the Integrity of Financial Information Ensuring the Integrity of Financial Information C H A P T E R 5.
Chapter 5 Check Tampering.
Forensic and Investigative Accounting Chapter 18 Forensic Accounting in Action © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
How Encompassing is FRAUD in the U. S.? The 1996 Report to the Nation on Occupational Fraud and Abuse estimated  6% of Revenue lost due to fraud in some.
Chapter 4 Billing Schemes.
Reporting and Interpreting Sales Revenue, Receivables, and Cash Chapter 6 McGraw-Hill/Irwin © 2009 The McGraw-Hill Companies, Inc.
Chapter 6 Payroll Schemes.
0 Glencoe Accounting Unit 4 Chapter 15 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Unit 4 The Accounting Cycle for a Merchandising.
Chapter 10 Auditing the Revenue Process McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
Copyright 2003 Prentice Hall Publishing Company1 Chapter 7 Sales and Collection Cycle.
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO4 Describe accounting procedures used.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Audit of the Sales and Collection Cycle. Identify the accounts and the classes of transactions in the sales and collection cycle. Describe the business.
FRAUD AND INTERNAL CONTROLS FOR SMALL ORGANIZATIONS.
Accounts Receivable, Accounts Payable & Cash
Chapter 9 Non-Cash Assets.
Reporting and Interpreting Sales Revenue, Receivables, and Cash
Chapter 9 Non-Cash Assets.
Internal Control Procedures and Bank Reconciliation Preparation
Presentation transcript:

1 Non-Cash Assets Chapter 9

2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash misappropriations from the 2011 Global Fraud Survey. Explain how misuse of non-cash assets can negatively affect organizations. Understand how and why unconcealed larceny of non-cash assets occurs. Be familiar with internal controls and tests that can be used to prevent and detect non-cash larceny. Understand how weaknesses in internal asset requisition and transfer procedures can lead to the misappropriation of non- cash assets. Learning Objectives

3 Explain how purchasing and receiving schemes are used to misappropriate non-cash assets. Understand how the theft of non-cash assets through the use of fraudulent shipments is accomplished. Define the term “shrinkage.” Describe how fraudsters conceal the theft of non-cash assets on the victim organization’s books. Understand how fraudsters misappropriate intangible assets and how companies can protect themselves. Be familiar with proactive audit tests that can be used to detect misappropriations of non-cash assets. Learning Objectives

4 Inventory and All Other Assets Inventory and All Other Assets Larceny Misuse Asset Req. & Transfers Asset Req. & Transfers False Sales & Shipping False Sales & Shipping Purchasing & Receiving Purchasing & Receiving Unconcealed Larceny Unconcealed Larceny

5 Cash vs. Non-Cash Schemes 2011 Global Fraud Survey Scheme Type % of Asset Misappropriation Cases Median Loss Cash Misappropriations82.1%$100,000 Non-Cash Misappropriations19.9%$58,000

6 Non-Cash Cases by Type of Asset Misappropriated

7 Median Loss by Type of Asset in Non-Cash Schemes

8 Non-Cash Tangible Asset Misappropriations Misuse Unconcealed larceny Asset requisitions and transfers Purchasing and receiving schemes Fraudulent shipments

9 Misuse of Non-Cash Tangible Assets Typical misuse –Company vehicles –Company supplies –Computers –Other office equipment Doing personal work on company time Running side businesses

10 The Costs of Inventory Misuse Loss of productivity Need to hire additional employees to compensate Lost business if employee’s business competes Unauthorized use of equipment can mean additional wear and tear sooner or more often

11 Unconcealed Larceny Schemes Greater concern than misuse of assets Most schemes are not complex Some employees know their co-workers are stealing but refrain from reporting it Many of the employees who steal company property are highly trusted Assets misappropriated after-hours or mailed to perpetrator

12 The Fake Sale Needs an accomplice Sale is not rung up but the accomplice takes the merchandise Accomplice may return merchandise for cash

13 Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets Segregate the duties of requisitioning, purchasing, and receiving Segregate the duties of payables, purchasing, and receiving Maintain physical security of merchandise Track those who enter secure areas through access logs Install security cameras and let their presence be known

14 Preventing and Detecting Unconcealed Larceny of Non-Cash Tangible Assets Conduct inventory counts on a periodic basis by someone independent of the purchasing and warehousing functions Suspend shipping and receiving activities during physical counts Investigate significant discrepancies Independently follow-up on customer complaints

15 Asset Requisitions and Transfers Documentation enables non-cash assets to be moved from one location to another Internal documents can be used to fraudulently gain access to merchandise Basic scheme is to requisition materials to complete a work-related project, then steal the materials Inventory stored in multiple locations creates opportunities

16 Purchasing and Receiving Schemes Assets were intentionally purchased by the company but misappropriated Falsifying incoming shipments –May also reject portion of the shipment as being substandard –Perpetrator keeps the “substandard” merchandise

17 False Shipments of Inventory and Other Assets False shipping and sales documents are created to make it appear that the inventory was sold False packing slips can allow the inventory to be delivered to fraudster or accomplice To hide the theft a false sale is created Receivable is aged and written off Legitimate sale is understated

18 Other Schemes Assets are written off in order to make them available for theft Assets are declared as scrap and given to the employee New equipment is ordered for the company to replace old – new equipment is sent to employee’s home leaving old equipment in place

19 Concealing Inventory Theft Key concealment issue is shrinkage Inventory shrinkage is the unaccounted-for reduction in the company’s inventory due to theft Since shrinkage signals fraud, the fraudster must prevent anyone from looking for the missing assets Physical count of inventory detects shrinkage

20 Concealing Inventory Theft Altered inventory records –Forced reconciliation –Deleting or covering up the correct totals and entering new totals Fictitious sales and accounts receivable –Charge sale to existing account –Write-off to discounts and allowances or bad debt expense

21 Concealing Inventory Theft Write off inventory and other assets –Eliminates the problem of shrinkage Physical padding –Make it appear that there are more assets present that there actually are

22 Preventing and Detecting Thefts of Non- Cash Tangible Assets Separate the duties of: –Ordering goods –Receiving goods –Maintaining perpetual inventory records –Issuing payments Match the invoices to receiving reports before payments are issued Match the packing slip to an approved purchase order

23 Preventing and Detecting Thefts of Non- Cash Tangible Assets Match outgoing shipments to sales orders before merchandise goes out Periodically match inventory shipments to sales records Investigate shipments that cannot be traced to a sale Check out unexplained increases in bad debt expense

24 Preventing and Detecting Thefts of Non- Cash Tangible Assets Compare shipping addresses to employee addresses Review unexplained entries in perpetual inventory records Reconcile materials ordered for specific projects with actual work done Perform trend analysis on scrap inventory Check to make sure that inventory removed from inventory is properly approved

25 Misappropriation of Intangible Assets Misappropriation of information –Includes theft of competitively sensitive information, (e.g., trade secrets, customer lists, marketing strategies) –Can undermine value, reputation, and competitive advantage –Can result in legal liabilities –Identify most valuable information and take steps to protect it Misappropriation of securities –Proper internal controls over investment portfolio