Chapter 4 Billing Schemes.

Slides:



Advertisements
Similar presentations
Auditing the Purchasing Process
Advertisements

JPMorgan Chase Purchasing Card Training
RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Chapter 5 Check Tampering.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
Accounting Information Systems: Definitions and Characteristics.
Cash Receipt Schemes and Other Asset Misappropriations
Chapter 2 Skimming.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
Register Disbursement Schemes
Chapter 9 Non-Cash Assets.
Chapter 3 Cash Larceny.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
Chapter 3 Cash Larceny.
The Accounts Payable/ Cash Disbursement (AP/CD) Process.
Chapters 8 Acquisition and Expenditure Cycle Accounting 4081Chapters 8.
Chapter 13 The Accounts Payable/ Cash Disbursement (AP/CD) Process
Chapter 5 Expenditure Cycle Applications. Expenditure Documents i.Purchase Requisitions ii.Purchase Orders iii.Receiving Report iv.Voucher Systems v.Invoice.
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
P-1: Enter cash receipts close to originating source Ensure effectiveness of operations: As reflected by the entries in goal columns A and B under process.
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
© The McGraw-Hill Companies, Inc., 2005 McGraw-Hill/Irwin Chapter 6 Reporting and Analyzing Cash and Internal Controls 6-1.
Chapter 11 Auditing the Purchasing Process McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Internal Control and Cash Chapter 8 Define internal control. Objective 1.
Auditing the Purchasing Process
Student Affairs Buying 101 Procurement Methods Students First Topic
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
Financial Resource Management Recommended Best Practices Training for Volunteers and Support Groups.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
 Advances & Clear Advances  Foreign Vendors  Manual POs  Wire Transfers.
Expense Reimbursement Schemes
© The McGraw-Hill Companies, Inc., 2008 McGraw-Hill/Irwin Chapter 6 Reporting and Analyzing Cash and Internal Controls.
Accounting for Purchases and Cash Payments
Chapter 8: Payroll and Expense Reimbursement Schemes
Lecture 30 Chapter 07 Cash Task Force Image Gallery clip art included in this electronic presentation is used with the permission of NVTech Inc.
Accounting & Financial Analysis 11 Lecture 2 Source Documents.
Travel Update and Review Controller’s Office October 26, 2011.
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
1 Pre-Audit Requisition Auditing Receive Requisitions from Dean’s Office Begin OK? Verify Class Code is Appropriate for Item Verify Description Is Complete.
This lesson will help you learn best practices for financial management and apply them to the areas of:  Ethical Handling of Funds  Collecting Funds.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 11-1 Expense and Liability Recognition Expenses are outflows.
Chapter 5 Check Tampering.
XAVIER UNIVERSITY FINANCIAL PAPERWORK PROCESS Overview for Students (Yes, you can fill out your own forms with confidence and ease!) Joanie Weidner,
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
Chapter 4 Billing Schemes.
Chapter 6 Payroll Schemes.
Accounting & Financial Analysis 1 Introduction to Accounting.
Chapter 6 Audit of Cash Accounting 4081Chapter 6.
Matakuliah : F0204 / Sistem Akuntansi
Protecting Your Assets By Preventing Identity Theft 1.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
The Accounts Payable / Cash Disbursement (AP/CD) Process Pertemuan Matakuliah: F0642 / Perancangan Sistem Akuntansi Tahun: 2009.
Protecting Your Assets By Preventing Identity Theft
Chapter 6 Audit of Cash Accounting 408 Chapter 6.
Acquisition and Expenditure Cycle
Chapter 9 Non-Cash Assets.
WHO IS STEALING FROM YOU
Chapter 9 Non-Cash Assets.
7 Sarbanes-Oxley, Internal Control, and Cash
7 Sarbanes-Oxley, Internal Control, and Cash
Agency Account Training
Presentation transcript:

Chapter 4 Billing Schemes

Pop Quiz What is a pass-through billing scheme?

Learning Objectives List the five major categories of fraudulent disbursements. Define the term “billing schemes.” List the three categories of billing schemes. Understand what a shell company is and how it is formed. List and understand the four ways false invoices are approved for payment. Understand why most shell company schemes involve the purchase of services rather than goods. Understand how a pass-through scheme differs from the usual shell company schemes. Be familiar with the methods identified in this chapter for preventing and detecting shell company schemes.

Learning Objectives Understand how pay-and-return schemes work. Understand how non-accomplice vendor schemes work. Be familiar with the methods identified in this chapter for preventing and detecting non-accomplice vendor schemes. Understand how personal purchases schemes work. Be familiar with the methods identified in this chapter for preventing and detecting personal purchases schemes. Be familiar with proactive audit tests that can be used to detect billing schemes.

Billing Schemes Shell Company Non-Accomplice Vendor Personal Purchases

Frequency of Fraudulent Disbursements

Median Loss of Fraudulent Disbursements

Billing Schemes The perpetrator uses false documentation to cause a payment to be issued for a fraudulent purpose Fraudulent disbursement is issued in same manner as a legitimate disbursement Schemes Shell company schemes Non-accomplice vendor schemes Personal purchases schemes

Shell Company Schemes Fictitious entities created for the sole purpose of committing fraud Bank account is usually set up in the company’s name Forming a shell company Certificate of incorporation or assumed-name certificate set up Shell company may be formed in someone else’s name Best way is to set up company under a fictitious name Set up entity’s address – home address, post office box, or friend/relative’s address

Shell Company Submitting false invoices Invoice is manufactured using a professional printer, personal computer, or typewriter Self-approval of fraudulent invoices Most fraudsters are in a position to approve payment Approvals may be forged “Rubber stamp” supervisors Don’t check the documentation Approve whatever is submitted Reliance on false documents Without approval authority, fraudster submits false documents – purchase order, invoice, and receiving report

Shell Company Collusion Purchases of services rather than goods Two or more employees conspire to steal More difficult to detect Circumvents controls implemented to prevent fraud Purchases of services rather than goods Purchases of service are preferable to purchases of goods Services are intangible and fraud is more difficult to detect Pass-through schemes Goods or services are purchased by the employee and resold to the victim company at an inflated price

Preventing and Detecting Shell Company Schemes Maintain and regularly update an approved vendor list Independently verify all vendors before payment Identifying shell company invoices Lack of detail on the fraudulent invoice Invoice that lacks detailed descriptions of the items billed Mailing address may be an indicator of fraud Consecutively numbered invoices over a period of time Reviewing payables and sorting payments by vendor and invoice number

Preventing and Detecting Shell Company Schemes Testing for shell company schemes Investigate budget overruns and departments that regularly exceed their budget Conduct horizontal analysis of expenses Investigate unexplained increases in “soft” accounts Investigate unexplained increases in quantity of items purchased

Preventing and Detecting Shell Company Schemes Testing for shell company schemes Monitor trends in average unit price Investigate goods and services that would not normally be purchased Compare vendor addresses to employee addresses Run reports of average turnaround time for invoices to look for unusual payment patterns

Preventing and Detecting Shell Company Schemes Verifying whether a shell company exists Use the Internet to verify the vendor Contact others in the industry Verify vendor’s address through a site visit or by using satellite imaging software Identifying the employee behind a shell company Conduct a public records search of the company’s registration Be alert for related names, addresses, phone numbers, Social Security numbers, and other identities Match vendor payments with payroll checks Conduct surveillance of mail drops to see who picks up the checks

Billing Schemes – Non-Accomplice Vendors Vendor is not a part of the scheme Pay-and-return schemes Payments owed to legitimate vendors intentionally mishandled Double pay an invoice Pay the wrong the vendor Overpay the invoice amount Purchase excess merchandise Overbilling with a non-accomplice vendor’s invoices Fake invoice is created for a vendor that regularly does business with victim organization Rerun an invoice already paid

Preventing and Detecting Non-Accomplice Vendor Fraud Incoming checks should be photocopied and attached to the remittance advice Regarding overpayments, banks should be instructed not to cash checks payable to an organization Spot check past accounts payable files when a pay-and-return scheme is suspected

Personal Purchases With Company Funds Employees make personal purchases for themselves, their businesses, their family, or their friends using company money Perpetrator causes the victim company to order and pay for an unneeded asset

Personal Purchases Through False Invoices The fraudster is authorizer of invoices Falsifying documents such as purchase orders to obtain authorization Altering existing purchase orders False purchase requisitions Misrepresent the nature of the purchase Change the delivery address of the purchase

Personal Purchases on Credit Cards, Purchasing Cards, or Other Company Accounts Employees make purchases using their company credit cards, purchasing cards, or running accounts with vendors Company cards may be stolen or “borrowed” from authorized users Charge accounts Employees order items using an existing account with the vendor Returning merchandise for cash/credit Employee purchases a good or service, receives reimbursement, and then returns the item for a credit

Preventing and Detecting Personal Purchases Conduct a thorough review of each credit card or purchasing card statement independent of the signature authority Only original support for the reimbursement should be allowed Card issuer should send two copies of the statement to two different individuals within the organization Card statements should be compared with employee expense vouchers for duplications, and monitored for unexplained increases in purchasing levels