Expense Reimbursement Schemes

Slides:



Advertisements
Similar presentations
Step-by-Step Verify your vendor number Complete Travel Authorization Form Sign under claimant Attach agenda and documentation to support estimates for.
Advertisements

Group 3 Maria Fernandez de Castro Sonia Canessa-Gonzalez Andres Suarez
Basic Fraud Audit Pertemuan X Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
1 Fraud Prevention and Deterrence Pam Peters, CFE Office of Internal Audit.
ProCard Reviewer Tips PR001A Procurement Services Montey Caston Updated January 22, 2014.
RED FLAGS OF OCCUPATIONAL FRAUD Caroline Burnell, CFE, CGFM.
The Office Procedures and Technology
FRAUD: Risks and Prevention. Fraud: Risks and Prevention Implications of fraud What motivates one to commit fraud The importance of internal control Fraud.
Chapter 5 Check Tampering.
1 Non-Cash Assets Chapter 9. 2 List the five categories of tangible non-cash misappropriations discussed in this chapter. Discuss the data on non-cash.
1 Expense Reimbursement Schemes Chapter 7. 2 Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from.
Chapter 2 Skimming.
FRAUD EXAMINATION ALBRECHT, ALBRECHT, & ALBRECHT Fraud Against Organizations Chapter 15.
Chapter 12 Cash Disbursement Schemes
Register Disbursement Schemes
Chapter 3 Cash Larceny.
Departmental Petty Cash Funds Boston University Medical Campus Revised 9/09.
CHAPTER 8 INTERNAL CONTROL AND CASH After studying this chapter, you should be able to: 1 Define internal control. 2 Identify the principles of internal.
Reducing Fraud With Improved Internal Controls Dr. Raymond S. Kulzick, CPA St. Thomas University Miami, Florida Copyright 2004 R. S. Kulzick.
No Fraud Left Behind Fraud Risks and Prevention (Info gathered from the Association of Certified Fraud Examiners) Runyon Kersteen Ouellette.
Chapter 3 Cash Larceny.
Chapter 12 Review.
Chapter 4: Cash Larceny.
Billing Schemes. O C C U P A T I O N A L F R A U D a n d A B U S E C L A S S I F I C A T I O N S Y S T E M.
Audit Procedures for Misappropriation of Assets Pertemuan XXIV Matakuliah: F0184/Audit atas Kecurangan Tahun: 2007.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Audit of Cash Balances Chapter 22.
Prepared by. As stewards of a chapter’s money the chapter officers are responsible for the careful handling and dissemination of funds.
Chapter 4 Billing Schemes.
Albrecht, Albrecht, Albrecht, Zimbelman Chapter 14: Fraud Against Organizations © 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned,
© The McGraw-Hill Companies, Inc., 2005 McGraw-Hill/Irwin Chapter 6 Reporting and Analyzing Cash and Internal Controls 6-1.
©2003 Prentice Hall Business Publishing, Essentials of Auditing 1/e, Arens/Elder/Beasley Audit of Cash Balances Chapter 17.
What is Check Tampering? Form of Fraudulent Disbursement Employee does one of two things: Prepares a fraudulent check for own benefit Converts a check.
“AUDITS” Checks and Balances End of Each Fiscal Year. 2. When there is a Change in Officers. Most People will ask….. …. When do I need to do an.
The Office Procedures and Technology Chapter 6 Processing and Understanding Financial Information Copyright 2003 by South-Western, a division of Thomson.
© The McGraw-Hill Companies, Inc., 2008 McGraw-Hill/Irwin Chapter 6 Reporting and Analyzing Cash and Internal Controls.
CASH RISK ASSESSMENT. Fraud OverviewFraud SchemesWhen & How Fraud HappensOur Approach to Fraud Deterrence Overview.
Chapter 8: Payroll and Expense Reimbursement Schemes
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Audit of Cash Balances Chapter 23.
Financial and Managerial Accounting Wild, Shaw, and Chiappetta Fifth Edition Wild, Shaw, and Chiappetta Fifth Edition McGraw-Hill/Irwin Copyright © 2013.
Audit of Cash Balances Chapter Learning Objective 1 Show the relationship of cash in the bank to the various transaction cycles.
CJ 125 UNIT THREE BILLING AND CHECK TAMPERING SCHEMES.
+ Accounting for Cash & Internal Controls Chapter 6.
Internal Control 7. Management Issues Related to Internal Control OBJECTIVE 1: Identify the management issues related to internal control.
Chapter 5 Check Tampering.
CJ 125 UNIT TWO SKIMMING AND LARCENY. REVIEW THREE MAJOR CATEGORIES OF FRAUD WHAT ARE THEY?
1 Payroll Schemes Chapter 6. 2 List and understand the three main categories of payroll fraud. Understand the relative cost and frequency of payroll frauds.
How Encompassing is FRAUD in the U. S.? The 1996 Report to the Nation on Occupational Fraud and Abuse estimated  6% of Revenue lost due to fraud in some.
Copyright ©2006 by the Association of Certified Fraud Examiners, Inc. 1.
Chapter 4 Billing Schemes.
8-1. Unit 8 Paying Employees McGraw-Hill/Irwin Copyright © 2006 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 6 Payroll Schemes.
©2010 Association of Certified Fraud Examiners, Inc.
CJ 125 UNIT FOUR PAYROLL SCHEMES. THE MAIN CATEGORIES OF PAYROLL FRAUD Payroll Schemes Occupational frauds in which a person who works for an organization.
Unit 8 Employee Theft Professor Thomas Genovese. Occupational Fraud Corruption Fraudulent Financial Statements Asset Misappropriation.
0 Glencoe Accounting Unit 4 Chapter 17 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Unit 4 The Accounting Cycle for a Merchandising.
Chapter Four Internal Controls, Accounting for Cash, and Ethics © 2015 McGraw-Hill Education.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Audit of Cash Balances Chapter 23.
Check Requests and Travel
Audit of Cash Balances Chapter 22.
Introduction to Fraud Examination
Recent Fraud Investigations
Chapter 9 Non-Cash Assets.
Chapter 9 Non-Cash Assets.
Financial Accounting, Fifth Edition
Joint Accounting Conference Internal Controls – “The Good, the Bad, and the Ugly” Prepared by: Matt Wood, CPA – Partner.
Types of Cash Accounts Imprest Payroll Account Branch Bank Account
Unit 4 The Accounting Cycle for a Merchandising Corporation
Chapter 21 Accounting Practices.
Presentation transcript:

Expense Reimbursement Schemes Chapter 7 Expense Reimbursement Schemes

Learning Objectives Explain what constitutes expense reimbursement fraud. Discuss the data on expense reimbursement fraud from the 2004 National Fraud Survey. Understand how mischaracterized expense reimbursement schemes are ­committed. Be familiar with the controls identified in this chapter for preventing and ­detecting mischaracterized expense schemes. Identify the methods employees use to overstate otherwise legitimate ­expenses on their expense reports. Understand controls that can be used to prevent and detect overstated ­expense schemes.

Learning Objectives Explain what a fictitious expense reimbursement scheme is and differentiate it from other forms of expense reimbursement fraud. Identify red flags that are commonly associated with fictitious expense schemes. Discuss what a multiple reimbursement scheme is and how this kind of fraud is committed. Discuss the controls identified in this chapter for preventing and detecting multiple reimbursement schemes. Be familiar with proactive audit tests that can be used to detect various forms of expense reimbursement fraud.

Expense Reimbursement Schemes Mischaracterized Expenses Overstated Fictitious Expenses Multiple Reimbursements

Frequency of Fraudulent Disbursements Expense Reimbursement

Median Loss Fraudulent Disbursements Expense Reimbursement

Dollar Loss Distribution Expense Reimbursement Schemes

Detection of Schemes Expense Reimbursement Schemes

Perpetrators – Expense Reimbursement Schemes

Median Loss by Perpetrator

Size of Victim Expense Reimbursement Schemes

Median Loss by Number of Employees Expense Reimbursement Schemes

Expense Reimbursement Schemes Employees are reimbursed for expenses paid on behalf of the employer Airfare, hotel bills, business meals, mileage,ground transportation and so on Business purpose explained and receipts attached per the organization’s guidelines

Mischaracterized Expense Reimbursements Purpose of reimbursement request is misstated Reimbursement for personal expenses not allowed Personal trips listed as a business trips Non-allowable meals with friends and family Most are by high-level employees, owners, or officers (in the study) Common element – lack of detailed expense reports

Preventing and Detecting Mischaracterized Expenses Establish and adhere to a system of controls Require detailed expense reports with original support documentation Require direct supervisory review of all travel and entertainment expenses Establish a policy that clearly states what will and will not be reimbursed

Preventing and Detecting Mischaracterized Expenses Scrutinize any expense report that is approved outside the requestor’s department Compare dates of claimed expenses to work schedules Compare prior year expenses to current year expenses and to budgeted expenses

Overstated Expense Reimbursements Altered receipts Overpurchasing Overstating another employee’s expenses Orders to overstate expenses

Preventing and Detecting Overstated Expense Reimbursements Require original receipts for all expense reimbursements If photocopied receipts are submitted, independently verify the expense Require original ticket stubs for airline and rail travel Compare employee’s expense reports with co-workers to identify inconsistencies Spot check expense reports with customers

Fictitious Expenses Producing fictitious receipts Personal computers Calculators Cut and paste Obtaining blank receipts from vendors Claiming the expenses of others

Preventing and Detecting Fictitious Expense Reimbursements High dollar items that were paid in cash Expenses that consistently rounded off, ending with “0” or “5” Expenses that are consistently for the same amount Reimbursement requests that consistently fall at or just below the reimbursement limit Receipts that are submitted over an extended time that are consecutively numbered Receipts that do not look professional or lack information about the vendor

Multiple Reimbursement Schemes A single expense item is submitted several times to receive multiple reimbursements Example: Airline ticket stub and travel agency’s invoice Submit the credit card receipt for items charged to the company’s credit card account Submitting the same expenses to different budgets

Preventing and Detecting Multiple Reimbursement Schemes Enforce a policy against accepting photocopies If photocopies are accepted, the accounting system should have an edit for duplicates Establish clearly what types of support documentation are acceptable Scrutinize expense reports that are approved by supervisors outside the requestor’s department Require expense reimbursements be approved by the employee’s direct supervisor Establish a policy that expenses must be submitted by a certain time limit

Mid-term Exam practice questions

1. Purchasing personal items using an organization’s money is what type of scheme? Inventory theft scheme Billing scheme Pay-and-return scheme Off-book scheme

1. Purchasing personal items using an organization’s money is what type of scheme? Inventory theft scheme Billing scheme Pay-and-return scheme Off-book scheme

2. Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day. This is an example of what type of concealment? Deposit in transit Deposit lapping Force balance depositing None of the above are correct

2. Mel Turner, the runner for a small bookstore, had a bad habit of helping himself to cash from the deposit on the way to the bank. He covered his tracks by substituting a check from the next day’s deposit for the amount he stole from the previous day. This is an example of what type of concealment? Deposit in transit Deposit lapping Force balance depositing None of the above are correct

3. Which of the following is not considered to be a red flag for fictitious expenses? Expenses are consistently rounded off Reimbursement request consistently falls at or just below the reimbursement limit Receipts that do not look professional Payment in cash for expenses

3. Which of the following is not considered to be a red flag for fictitious expenses? Expenses are consistently rounded off Reimbursement request consistently falls at or just below the reimbursement limit Receipts that do not look professional Payment in cash for expenses

4. In order to prove fraud, four elements must be proved 4. In order to prove fraud, four elements must be proved. Which of the following is not a general element of fraud? A material false statement Knowledge that the statement was false Reliance on the false statement by the victim Material damages resulting from the victim’s reliance on the statement

4. In order to prove fraud, four elements must be proved 4. In order to prove fraud, four elements must be proved. Which of the following is not a general element of fraud? A material false statement Knowledge that the statement was false Reliance on the false statement by the victim Material damages resulting from the victim’s reliance on the statement

5. The most basic way that an employee executes an authorized maker scheme is to override controls designed to prevent fraud in the first place. True False

5. The most basic way that an employee executes an authorized maker scheme is to override controls designed to prevent fraud in the first place. True False

6. The following methods can be used to detect sales skimming with the exception of: Comparing register tapes to the cash drawer and investigating discrepancies Summarizing the net sales by employee extracting the top employees with low sales Installing video cameras at cash entry points Offering discounts to customers who do not get receipts for their purchases

6. The following methods can be used to detect sales skimming with the exception of: Comparing register tapes to the cash drawer and investigating discrepancies Summarizing the net sales by employee extracting the top employees with low sales Installing video cameras at cash entry points Offering discounts to customers who do not get receipts for their purchases

7. In the 2004 Report to the Nation on Occupational Fraud and Abuse, fraudulent financial statements were the most costly in terms of median loss as opposed to asset misappropriations and corruption. True False

7. In the 2004 Report to the Nation on Occupational Fraud and Abuse, fraudulent financial statements were the most costly in terms of median loss as opposed to asset misappropriations and corruption. True False

8. In one of the case studies in the text book, Albert Miano, the facilities supervisor for a popular magazine, submitted the phony invoices and checks were made payable to a contractor. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? The auditors found a discrepancy in the invoices that were submitted It was found by accident by the new chief of internal audit The vendor received a check by mistake and called the accounts payable department The external audit found it in an audit sample of canceled checks

8. In one of the case studies in the text book, Albert Miano, the facilities supervisor for a popular magazine, submitted the phony invoices and checks were made payable to a contractor. When Miano received the checks for the phony invoices, he forged the contractor’s signature. He then endorsed the check in his own name. How was the fraud caught? The auditors found a discrepancy in the invoices that were submitted It was found by accident by the new chief of internal audit The vendor received a check by mistake and called the accounts payable department The external audit found it in an audit sample of canceled checks

9. Which of the following choices is not a payroll scheme? Ghost employee schemes False deduction schemes Falsified hours and salary schemes All of the above are correct

9. Which of the following choices is not a payroll scheme? Ghost employee schemes False deduction schemes Falsified hours and salary schemes All of the above are correct

10. Mary Duncan is an internal auditor for the Western Realty Group 10. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of the normal sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which one of the following check tampering scheme(s) is likely? Forged maker Concealed checks Authorized maker All of the above

10. Mary Duncan is an internal auditor for the Western Realty Group 10. Mary Duncan is an internal auditor for the Western Realty Group. Recently, she ran a program that extracted checks that were out of the normal sequence. She found that four or five checks were written every month that fit this category. Based on the information given, which one of the following check tampering scheme(s) is likely? Forged maker Concealed checks Authorized maker All of the above