Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.

Slides:



Advertisements
Similar presentations
LESSON 5-1 Vouchers and Voucher Registers
Advertisements

RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
The Sales Journal and the Purchases Journal
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
Chapter 2 Skimming.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
6 Accounting for Merchandising Businesses Accounting 26e C H A P T E R
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO4 Describe accounting procedures used.
Register Disbursement Schemes
Chapter 9 Non-Cash Assets.
Chapter 3 Cash Larceny.
Fraud in Nonprofits: Real Stories Presented by: Mike Hablewitz, CPA, Senior Manager.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
Chapter 3 Cash Larceny.
Accounts Payable Training Vendor Information & Voucher Preparation Revised 10/16/2014.
Chapters 8 Acquisition and Expenditure Cycle Accounting 4081Chapters 8.
1 Financial Accounting: Tools for Business Decision Making, 4th Ed. Kimmel, Weygandt, Kieso CHAPTER 5 Prepared by Dr. Joseph Otto.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Chapter 4: Cash Larceny.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Collecting and Reporting Accounting Information Design of an effective AIS begins by considering outputs from the system. Outputs of an AIS include: 1.
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
The PAYABLES Module Beyond Basics Slideshow 3B. Filing HST Returns 3 Vendor Prepayment 6 Discount for Merchandise Purchases 8 Discount for Non-Merchandise.
Accounting for Purchases and Cash Payments. Buy goods from supplier Sell merchandise to consumer.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Virtual Enterprises, International 1 ACCOUNTING DEPARTMENT WORKFLOW VIRTUAL ENTERPRISES, INTERNATIONAL.
Internal Control and Cash Chapter 8 Define internal control. Objective 1.
Perpetual Inventory System
Student Affairs Buying 101 Procurement Methods Students First Topic
© 2014 Cengage Learning. All Rights Reserved. Do Now: ●Where do you get new shoes? ●Have you ever had to wait for a size you need to be brought out to.
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
 Advances & Clear Advances  Foreign Vendors  Manual POs  Wire Transfers.
Chapter 15, Section 1 Purchasing Items Needed by a Business
Accounting for Purchases and Cash Payments
Chapter 8: Payroll and Expense Reimbursement Schemes
Accounting for a Merchandising Business
1 Chapter 6 Merchandising Operations and Internal Control Adapted from Financial Accounting 4e by Porter and Norton.
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
Slideshow 4A Accounts Payable Transaction Processing Part 1.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Chapter 8 Purchasing/Human Resources/Payment Process: Recording and Evaluating Expenditure Process Activities Copyright © 2011 by The McGraw-Hill Companies,
Chapter 5 Check Tampering.
XAVIER UNIVERSITY FINANCIAL PAPERWORK PROCESS Overview for Students (Yes, you can fill out your own forms with confidence and ease!) Joanie Weidner,
Purchasing Items Needed by a Business
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Chapter 6 Payroll Schemes.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
© 2014 Cengage Learning. All Rights Reserved. Learning Objectives © 2014 Cengage Learning. All Rights Reserved. LO4 Describe accounting procedures used.
LO4 Describe accounting procedures used in ordering merchandise. LO5 Discuss the purpose of a special journal. LO6 Journalize purchases of merchandise.
CHAPTER 11 COMPUTERISED ACCOUNTING SYSTEMS. OBJECTIVE TEST 1.What assets make up the cash and cash equivalents line item on the SFP? 2.What statement.
UW Whitewater Procurement Card Program. Overview The purpose of UW-Whitewater Procurement Card Program is to establish a more efficient, cost- effective.
UW Whitewater Procurement Card Program
Acquisition and Expenditure Cycle
Chapter 9 Non-Cash Assets.
Chapter 9 Non-Cash Assets.
Purchases and disbursements
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
Presented by Internal Audit Department
© 2014 Cengage Learning. All Rights Reserved.
© 2014 Cengage Learning. All Rights Reserved.
LESSON 9-2 Accounting for Merchandise Purchases
© 2014 Cengage Learning. All Rights Reserved.
Presentation transcript:

Billing Schemes

O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M

Asset Misappropriations Cash (90%) Inventory and Other Assets Skimming (28.9%) Larceny (4.1%) Fraudulent Disbursements (67.0%)

Fraudulent Disbursements Billing Schemes Payroll Schemes Check Tampering Expense Reimb. Register Disbursmts.

Finally, most fraudulent disbursements fall into one of the above five categories.

What Are Billing Schemes? Schemes attacking purchasing function Cause organization to buy goods/services that are nonexistent, overpriced, or not needed Perp submits bogus invoice or other support Victim organization issues a check Perp collects payment

Billing Schemes 244 billing schemes were reported, with a median loss of $250,000. Billing schemes are the most common and most costly form of fraudulent disbursement.

Common Billing Schemes Shell company schemes Non-accomplice vendor schemes Personal purchases with company funds

Billing Schemes – Breakdown of Cases Of 244 billing schemes reported, over 90% were either personal purchases or shell company schemes. Billing schemes are the most common form of fraudulent disbursement.

Billing Schemes - Median Losses

Shell Company Schemes What is a shell company? Fictitious entity Created for purpose of committing fraud Only exist on paper Usually consist of bank account and mail drop Generally registered with state or county (perp needs registration to open bank account)

Shell Company Schemes Usually invoice for services, not goods – Services not tangible, harder to verify How shell company invoices get paid: – Perp has authority to approve payment – Supervisor “rubber stamps” purchases – Perp prepares bogus support documents – Collusion among several employees

Shell Company Schemes Pass-through schemes: Variation of standard shell company scheme Perp assigned to purchase goods/services for company Uses shell company to buy the items on credit Shell company sells items to employer at inflated price Pays off shell’s credit, excess is profit

Shell Company Schemes – Countermeasures Question invoices that have residential address or mail drop for mailing address Look for invoices with lack of detail – Missing phone #, fax #, invoice #, tax id, etc. Investigate invoices with no sales tax Sort payments by vendor, look for: – Consecutive invoice numbers – Consistent payment amounts, round numbers

Shell Company Schemes – Countermeasures If suspicions about vendor arise: – Look up vendor in phone book – Contact others in industry – Visit address to verify existence – Independently verify delivery before paying Periodically run comparison reports between vendor/employee addresses Maintain up-to-date vendor list

Identifying the Perpetrator of a Shell Company Scheme Check articles of incorporation, dba Conduct surveillance on mail drop Review support: who requests, authorizes purchases? Review cancelled checks for bank acct info Don’t pay invoice, see who follows up Search workstation of suspect for evidence

Billing via Non-accomplice Vendors Perp overbills company on behalf of existing vendor Vendor not involved in the scheme Two common techniques: – Pay-and-return – Counterfeit invoices

Billing via Non-accomplice Vendors Pay-and-return scheme: Controls over returned checks may be more lax than outgoing checks Perp double-pays invoice, sends check to wrong address, etc. Tells recipient a mistake was made Asks for check back Steals the returned payment

Billing via Non-accomplice Vendors Counterfeit invoices: Perp generates bogus invoices, similar to existing vendor’s Easy to do with desktop publishing Company cuts check Perp steals check or has it delivered to mail drop

Non-Accomplice Vendors – Countermeasures Sort invoices by vendor, look for unusual invoice numbers, change in address or style Mail checks immediately after signing Restrict access to accounts payable records and addresses Investigate excessive purchases from particular vendor

Non-Accomplice Vendors – Countermeasures Independently spot-check purchases with vendors Install system to prevent duplicate payments Require all incoming mail to be opened by mailroom; all incoming checks logged (to prevent pay-and-return) Instruct bank not to cash checks payable to organization

Personal Purchases with Company Funds Perp uses company checks to buy personal items. Common examples: – Home supplies/construction – Side business – Pay medical, utility, credit card bills, etc. Merchandise may be returned for cash

Personal Purchases with Company Funds Methods of payment: Perp has approval authority for invoices Altered or bogus support documentation Initiate fraudulent purchase requisitions Buy on running accounts/purchase orders Use company credit card

Personal Purchases – Countermeasures Require all purchases to be delivered to centralized receiving department Separate purchasing and receiving functions Investigate any purchases that are ordered drop- shipped to unusual location Question purchases that do not appear to have a business purpose Review any purchases made without management approval

General Billing Scheme Red Flags Invoices cannot be traced to shipments Multiple payments to single vendor on same date Pattern of purchases just below review level Unusually quick turnaround on invoices Departments/employees consistently over budget Payments to multiple vendors for same product

General Billing Scheme Red Flags Extreme inventory shortages Expenses increase dramatically Unexplained rise in cost of goods sold Unexplained decrease in gross/net profits Excessive materials orders Goods not purchased at optimal point High level approval of a low level transaction

Billing Schemes Controls Invoices, purchase orders and receiving reports must be matched before payment issued Purchasing department should be independent of: – Receiving – Shipping – Accounting

Billing Schemes Controls Purchases must have management approval Maintain a current approved vendor list Use competitive bids for major purchases Vendor purchases should be reviewed for abnormal levels Control methods should be implemented for duplicate invoices/purchase orders