1 INTRODUCTION TO FRAUD Doug Kalesnikoff CA-IFA, CFE Tel # (306) 966-1471

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Chapter 2 Skimming.
Employee, Vendor, and Other Frauds against the Organization Other Frauds against the Organization McGraw-Hill/Irwin Copyright © 2012 by.
Fraudulent Financial Reporting and Forensic Accounting Presented by: Victor Hieken, UHY Advisors Jeffrey Streif, UHY Advisors.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
6 THE AUDIT PROCESS. AUDITRESPONSIBILITIES AND OBJECTIVES AUDITRESPONSIBILITIES Audit Objective Primary objective of the audit is to express an opinion.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Fraud Auditing Chapter 11.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11.
Fraud Auditing Chapter 11 By arens et.al.,.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Albrecht, Albrecht, Albrecht, Zimbelman © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except.
Fraud Scheme Pertemuan IV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Presented By: Donna Denker, CPA Donna Denker & Associates.
KHALID AZIZ Fraud Auditing KHALID AZIZ JOIN KHALID AZIZ ECONOMICS OF ICMAP, ICAP, MA-ECONOMICS, B.COM. FINANCIAL.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder Fraud Auditing Chapter 11.
Internal Controls, Fraud and Abuse Awareness presented by South Texas College Business Office Financial Information Services Connecting And Leading.
Internal Controls NAPPA FALL DISTRICT MEETING OCTOBER 24, 2014 LEE RAY – HUNTSVILLE UTILITIES.
Kpmg. The Fourth Asian Roundtable on Corporate Governance Shareholder Rights and the Equitable Treatment of Shareholders Deepankar Sanwalka KPMG “Tools.
Security Issues with Vendors, Employees, and Customers Chapter 10.
Fraud, Internal Control, and Cash
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
Presentation CIFAL PRESENTATION Date: 13 JUNE 2012 Place : Durban.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 3-1 Chapter Three Risk Assessment and Materiality Chapter Three.
©2010 Prentice Hall Business Publishing, Auditing 13/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
 2004 Prentice Hall Business Publishing, Accounting Information Systems, 9/e, by Bodnar/Hopwood 4 – 1 Transaction Processing and the Internal Control.
Chapter 10 Identifying and preventing fraud Qiang Jiang School of Business Sichuan University, China
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
OH 9-1 Protecting Revenue 10 OH 9-1. OH 9-2 Learning Objectives After completing this chapter, you should be able to: Identify and explain the three parts.
00 CHAPTER 1 Governance, Ethics, and Managerial Decision Making © 2009 Cengage Learning.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
Forensic and Investigative Accounting Chapter 18 Forensic Accounting in Action © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
The “F” Word: Fraud Presented by: Donna Mayes, CPA.
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Forensic and Investigative Accounting Chapter 3 Fraudulent Financial Reporting © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Unit 9: Electronic Fraud Professor Thomas Genovese.
Chapter 6 Payroll Schemes.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
Chapter 14 Internal Control, Corporate Governance, and Ethics.
Copyright © 2007 Pearson Education Canada 1 Chapter 10: Fraud Auditing.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Fraud Auditing Chapter 11.
Fraud: Does it really only happen to others? Amanda Francis.
F1 Fraud and fraudulent behaviour and their prevention in business.
Fraud’s Hidden Cost.
Internal Control Procedures
Managing the Risk of Fraud in Higher Education
WHO IS STEALING FROM YOU
Fraud Auditing Chapter 11.
Forensic Accounting Pertemuan XII
Internal Control Procedures and Bank Reconciliation Preparation
Chapter 12: Fraud Schemes & Fraud Detection
Chapter 2: Why People Commit Fraud
CCP 420: FRAUD DETECTION AND MANAGEMENT
2019/8/2 Topic 13 : Frauds 2019/8/2 Week 1.
Presentation transcript:

1 INTRODUCTION TO FRAUD Doug Kalesnikoff CA-IFA, CFE Tel # (306)

2 DEFINITION OF FRAUD CICA HANDBOOK S CICA HANDBOOK S “The term “fraud” refers to an intentional act by one or more individuals among management, other employees, those charged with governance, or third parties, involving the use of deception to obtain an unjust or illegal advantage” “The term “fraud” refers to an intentional act by one or more individuals among management, other employees, those charged with governance, or third parties, involving the use of deception to obtain an unjust or illegal advantage”

3 DEFINITION OF FRAUD ACCOUNTANT’S HANDBOOK OF FRAUD AND COMMERCIAL CRIME ACCOUNTANT’S HANDBOOK OF FRAUD AND COMMERCIAL CRIME Fraud is criminal deception intended to financially benefit the deceiver. Fraud is criminal deception intended to financially benefit the deceiver.

4 DEFINITION OF FRAUD THE CRIMINAL CODE S. 380(1) THE CRIMINAL CODE S. 380(1) Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence with the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service. Every one who, by deceit, falsehood or other fraudulent means, whether or not it is a false pretence with the meaning of this Act, defrauds the public or any person, whether ascertained or not, of any property, money or valuable security or any service.

5 DEFINITION OF FRAUD REGINA v. OLAN (1978) REGINA v. OLAN (1978) “Dishonest Deprivation” “Dishonest Deprivation”

6 THE ELEMENTS OF FRAUD DISHONEST active passive indirect active passive indirect DEPRIVATION DEPRIVATION risk of lossactual loss

7 Fraud v. Theft Fraud Fraud hidden hidden willingly part with property based on representation willingly part with property based on representation time lag time lag Theft Theft overt overt unwillingly part with property unwillingly part with property immediate immediate

8 WHO COMMITS FRAUD?

9 Who Commits Fraud Externally? Suppliersfalse invoicing, Suppliersfalse invoicing, short shipments Competitorsespionage, price fixing Competitorsespionage, price fixing Con Menfalse advertising Con Menfalse advertising Customersplanned bankruptcy, Customersplanned bankruptcy, false credit information

10 Who Commits Fraud Internally? Employeestheft of assets, Employeestheft of assets, lapping schemes Managersmanipulate system, Managersmanipulate system, kickbacks, expenses Officersfalse financial reporting Officersfalse financial reporting Directorsmanipulate share price, Directorsmanipulate share price, related party transactions

11 Opportunity PressureRationalization Fraud Triangle

12 Pressure What motivates the crime in the first place What motivates the crime in the first place Examples: Examples: –Inability to pay one’s bills –Gambling or drug addiction –Meeting of earnings’ targets for investors –Meeting of productivity targets at work –Desire of status symbols, houses, cars etc –Family problems including marital and sickness

13 Opportunity Must see a way to abuse the position of trust with low perceived risk of getting caught Must see a way to abuse the position of trust with low perceived risk of getting caught Place $500 in a coffee room with note that says “please do not steal”. How long would the money remain untouched? Place $500 in a coffee room with note that says “please do not steal”. How long would the money remain untouched? Internal controls Internal controls Honesty Scale Honesty Scale

14 Why People Commit Fraud

15 Rationalizations for Fraud I’m just borrowing the funds! I’m just borrowing the funds! I deserve it, I’m underpaid! I deserve it, I’m underpaid! I should have been promoted by now! I should have been promoted by now! It’s only the government! It’s only the government! I’m not hurting anyone! I’m not hurting anyone! Others are doing it! Others are doing it!

16 Fraud Behaviour Equations B = f (O,E) C = P – A C = P - A

17 What is a red flag? An irregularity that may relate to: Time Frequency Place Amount

18 Personal Red Flags Living beyond means Personal financial losses Addiction problems Change in personal circumstances Outside business interests Rarely takes vacations

19 More Personal Red Flags Rationalizes poor performance Rationalizes poor performance Provides unreliable work Provides unreliable work Dissatisfied with job Dissatisfied with job Close association to suppliers or competitors Close association to suppliers or competitors Likes to “beat the system” Likes to “beat the system”

20 FRAUD IN THE REVENUE CYCLE 4 FRONT END FRAUD 4 FALSE SALES INVOICES 4 LAPPING OF ACCOUNTS RECEIVABLE

21 Front End Frauds cash sales not recorded and cash diverted cash sales not recorded and cash diverted customers directed elsewhere customers directed elsewhere misappropriation of purchase rebates misappropriation of purchase rebates misappropriation of miscellaneous revenue misappropriation of miscellaneous revenue

22 False Sales Invoices invoices altered to reflect lower sale amount invoices altered to reflect lower sale amount invoices altered to reflect higher sale amount invoices altered to reflect higher sale amount

23 Lapping of Accounts Receivable robbing Peter to pay Paul robbing Peter to pay Paul subsequent receipts used to cover earlier misappropriations subsequent receipts used to cover earlier misappropriations

24 FRAUD IN THE COST CYCLE 4 FALSE INFORMATION 4 FALSE SUPPLIER INVOICES 4 FALSE EXPENSE REPORTS 4 SECRET COMMISSIONS & KICKBACKS 4 PAYROLL 4 OTHER

25 False Information false financial statements false financial statements overstated accounts and loans receivable overstated accounts and loans receivable over or understated accounts payable over or understated accounts payable fictitious suppliers fictitious suppliers false asset valuations false asset valuations false journal entries false journal entries altered internal company records altered internal company records

26 False Supplier Invoices goods not received goods not received inferior quality goods received inferior quality goods received service not rendered service not rendered invoice for higher value than received invoice for higher value than received invoice for higher quantity than received invoice for higher quantity than received

27 Example – Garry’s Construction Identify the suspicious characteristics of these two invoices.

28 False Expense Reports non-business items non-business items inflated items inflated items fictitious items fictitious items duplicate items duplicate items

29 Secret Commissions & Kickbacks gifts gifts cash cash travel travel entertainment entertainment consulting fees consulting fees future benefits future benefits

30 Payroll fictitious employees fictitious employees inflated hours inflated hours inflated rates inflated rates manipulated deductions manipulated deductions lump sum payments lump sum payments

31 Other Cost Cycle Fraud Procurement Fraud Procurement Fraud Bid-rigging Bid-rigging Employees in collusion with vendors Employees in collusion with vendors Vendor fraud Vendor fraud

32 FRAUD POLICY increases probability of discovery increases probability of discovery decreases probability of occurrence decreases probability of occurrence defines acceptable conduct and dealings defines acceptable conduct and dealings defines responsibilities for prevention & detection defines responsibilities for prevention & detection states consequences states consequences

33 CODE OF CONDUCT Relates to all aspects of employee: honesty honesty integrity integrity actions actions

34 Deterrents to Internal Fraud SYSTEM DETERRENTS 4 hiring practices 4 supervision and control 4 adequate books & records 4 proper authorization 4 segregation of duties 4 employee programs 4 internal audit 4 red flag program

35 Deterrents to Internal Fraud (5) PHYSICAL DETERRENTS 4 combination locks 4 card access 4 security 4 password controls

36 Deterrents to External Fraud (1) USE HONEST SUPPLIERS 4 background checks 4 due diligence reviews 4 feasibility studies

37 Deterrents to External Fraud (2) DEAL WITH HONEST CUSTOMERS 4 background checks 4 credit ratings 4 prior lawsuits

ASSESSING YOUR RISK What is your organization’s risk of fraud?

39 Fraud Risk Matrix Likelihood of Occurrence Impact on the Organization

40 Risk Assessment 4 management characteristics 4 industry conditions 4 operating characteristics 4 susceptibility of assets to misappropriation 4 employee relationships and pressures 4 controls

41 Management Characteristics 4 failure to display, communicate and support appropriate attitude regarding internal control and financial reporting 4 high management turnover 4 domination by an individual or small group 4 compensation related to the achievement of unduly aggressive operating targets

42 Susceptibility of Assets to Misappropriation large amounts of cash on hand large amounts of cash on hand small size, high demand, high value inventory small size, high demand, high value inventory easily convertible assets easily convertible assets fixed assets marketable or lack ownership identification fixed assets marketable or lack ownership identification

43 Control Risk Factors lack of appropriate segregation of duties lack of appropriate segregation of duties lack of independent checks lack of independent checks lack of appropriate management oversight lack of appropriate management oversight lack of job application screening lack of job application screening lack of mandatory vacations lack of mandatory vacations poor physical safeguarding of assets poor physical safeguarding of assets lack of timely and appropriate transaction documentation lack of timely and appropriate transaction documentation