CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.

Slides:



Advertisements
Similar presentations
Fraud and Internal Control Presented by Andy Harper Pugh & Company, P.C. April 28, 2011.
Advertisements

1 Corruption Chapter What are the two principle schemes involving bribery? Pop Quiz.
Basic Fraud Audit Pertemuan X Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Chapter 5 Check Tampering.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
1 Expense Reimbursement Schemes Chapter 7. 2 Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from.
Cash Receipt Schemes and Other Asset Misappropriations
Chapter 2 Skimming.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
Register Disbursement Schemes
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT
Chapter 9 Non-Cash Assets.
Chapter 3 Cash Larceny.
Dialing in on Fraud: Eliminating its Impact on the Bottom Line
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
Fraud in Nonprofits: Real Stories Presented by: Mike Hablewitz, CPA, Senior Manager.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
Chapter 3 Cash Larceny.
Chapters 8 Acquisition and Expenditure Cycle Accounting 4081Chapters 8.
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
Internal Controls, Fraud and Abuse Awareness presented by South Texas College Business Office Financial Information Services Connecting And Leading.
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Business Law -- week 7 Negotiable Instruments: a contract to pay money (commercial paper) Checks Cashier’s checks Promissary Notes Certificate of Deposit.
How to Protect Your Organization from Fraud
Security Issues with Vendors, Employees, and Customers Chapter 10.
Expense Reimbursement Schemes
CASH RISK ASSESSMENT. Fraud OverviewFraud SchemesWhen & How Fraud HappensOur Approach to Fraud Deterrence Overview.
Chapter 8: Payroll and Expense Reimbursement Schemes
IT Auditing & Assurance, 2e, Hall & Singleton C hapter 12: Fraud Schemes & Fraud Detection.
Justin K. Kiddy, CPA/PFS, CFE Fraud in your Charter School: Is it possible? How to defend against it?
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Chapter 5 Check Tampering.
IT Auditing & Assurance, 2e, Hall & Singleton Chapter 12: Fraud Schemes & Fraud Detection IT Auditing & Assurance, 2e, Hall & Singleton.
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
How Encompassing is FRAUD in the U. S.? The 1996 Report to the Nation on Occupational Fraud and Abuse estimated  6% of Revenue lost due to fraud in some.
Chapter 4 Billing Schemes.
Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Chapter 7 Fraud, Ethics, and Controls.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 6 Payroll Schemes.
Watch Your Back: Protecting Your Business Against Back-Office Fraud Steve Schottenfeld TraceTech Solutions, LLC.
Mr. Stasa © You should be able to:  Identify the different parts of a personal check  Complete a personal check  Endorse.
What is Fraud? MRWA 35 th Annual Conference December 9, 2015.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
INTERNAL AUDIT - ACCOUNTS PAYABLE AUDIT University of Washington August 11, 2011 Kim Herrenkohl, Director Western Washington University Office of the Internal.
1 Corruption Chapter What are the two principle schemes involving bribery? Pop Quiz.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
Experience perspective // CPAs & ADVISORS CLUB FINANCIAL MANAGEMENT BEST PRACTICES Presented by Rick Wittgren, CPA, partner.
Fraud Against Organizations FRAUD EXAMINATION ALBRECHT & ALBRECHT Fraud Against Organizations Chapter 13.
Introduction to Fraud Examination
Fraud’s Hidden Cost.
Acquisition and Expenditure Cycle
Chapter 9 Non-Cash Assets.
Fraud: An Auditor’s Perspective
Chapter 9 Non-Cash Assets.
Fraud Presentation By Tim Stepp.
Asset Misappropriation/ Fraud
Chapter 12: Fraud Schemes & Fraud Detection
Internal controls 01-Nov-2017.
Problem EP 12-9 Listed below is a selection of items from the internal control questionnaire on payables in Appendix 12A, Page 694. Are invoices, receiving.
Fraud Against Organizations
Presentation transcript:

CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES

BILLING SCHEMES WHAT IS A BILLING SCHEME? WHAT ARE THE THREE CATEGORIES?

Billing Schemes The perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose Fraudulent disbursement is issued in same manner as a legitimate disbursement Schemes 1. Shell company schemes 2. Non-accomplice vendor schemes 3. Personal purchases schemes

EXAMPLES OF THE THREE CATEGORIES OF BILLING SCHEMES SHELL COMPANY SCHEMES NON-ACCOMPLICE VENDOR SCHEMES PERSONAL PURCHASES SCHEMES

Shell Company Schemes Fictitious entities created for the sole purpose of committing fraud Bank account is usually set up in the company’s name Forming a shell company Certificate of incorporation or assumed-name certificate set up Shell company may be formed in someone else’s name Best way is set up company under a fictitious name Set up entity’s address – home address, post office box, or friend/relative’s address

Shell Company Submitting false invoices Invoice is manufactured using a professional printer, personal computer, or a typewriter Self-approval of fraudulent invoices Most fraudsters are in a position to approve payment Approvals may be forged “Rubber stamp” supervisors Don’t check the documentation Approve whatever is submitted Reliance on false documents Without approval authority, fraudster submits false documents – purchase order, invoice, and receiving reports

Shell Company Collusion Two or more employees conspire to steal More difficult to detect Circumvents controls implemented to prevent fraud Purchases of services rather than goods Purchases of service are preferable over purchases of goods Services are intangible and fraud is more difficult to detect Pass-through schemes Goods or services are purchased by the employee and resold to the victim company at an inflated price

Billing Schemes – Non-Accomplice Vendors Vendor is not a part of the scheme Pay-and-return schemes Payments owed to legitimate vendors intentionally mishandled Double pay an invoice Pay the wrong the vendor Overpay the invoice amount Purchase excess merchandise Overbilling with a non-accomplice vendor’s invoices Fake invoice is created for a vendor that regularly does business with victim organization Rerun an invoice already paid

PUT IT TO THE TEST WHAT TYPE OF BILLING SCHEMES WERE COMMITTED IN THE CASE “MEDICAL SCHOOL TREATS FRAUD AND ABUSE”?

CHECK TAMPERING SCHEMES HOW DO WE DEFINE A CHECK TAMPERING SCHEME? WHAT ARE THE FIVE MAJOR CATEGORIES?

THE FIVE MAJOR CATEGORIES 1. FORGED MAKER SCHEMES 2. FORGED ENDORSEMENT SCHEMES 3. ALTERED PAYEE SCHEMES 4. CONCEALED CHECK SCHEMES 5. AUTHORIZED MAKER SCHEMES

Forged Maker Schemes An employee misappropriates a check and fraudulently affixes the signature of an authorized maker Forged Endorsement Schemes Employee intercepts a company check intended for a third party Signs the third party’s name on the endorsement line of the check

Authorized Maker Schemes Employee with signature authority writes a fraudulent check Overriding controls through intimidation High-level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties

Concealed Check Schemes Employee prepares a fraudulent check and submits it along with legitimate checks Check is payable to the employee, accomplice, a fictitious person, or fictitious business Occurs when checks are signed without proper review or reviewer is busy In many cases, only the signature line is exposed and the payee is concealed

Authorized Maker Schemes Employee with signature authority writes a fraudulent check Overriding controls through intimidation High-level managers can make employees afraid to question suspicious transactions Can happen when ownership is absent or inattentive Poor controls Failure to closely monitor accounts Lack of separation of duties

PUT IT TO THE TEST HOW WAS MELISSA ROBINSON ABLE TO COMMIT CHECK TAMPERING FRAUD AND WHAT MEASURES DID SHE TAKE TO CONCEAL HER FRAUD IN THE CASE “A WOLF IN SHEEP’S CLOTHING”?

Happy Holidays!